Escolar Documentos
Profissional Documentos
Cultura Documentos
Versus
WITH
1
T P (C) NO 1796 OF 2013
W P (C) NO 37 OF 2015
2
W P (C) NO 342 OF 2017
AND
WITH
3
JUDGMENT
INDEX
C Submissions
1 (2017) 10 SCC 1
4
F.4 Privacy Concerns in the Aadhaar Act
1. Consent during enrolment and authentication & the right to access
information under the Aadhaar Act
2. Extent of information disclosed during authentication & sharing of core
biometric information
3. Expansive scope of biometric information
4. Other concerns regarding the Aadhaar Act: Misconceptions regarding the
efficacy of biometric information
5. No access to biometric records in database
6. Biometric locking
7. Key takeaways
H Proportionality
J Savings in Section 59
L Conclusion
5
PART A
Dr Dhananjaya Y Chandrachud, J
challenges for governance in a digital age. Part of the reason for these
challenges is that our law evolved in a radically different age and time. The
suited to the social, political and economic context of the time. The forms of
expression which the law codified were developed when paper was
ubiquitous. The limits of paper allowed for a certain freedom: the freedom of
individuality and the liberty of being obscure. Governance with paper could
reasoning. It reshapes the dialogue between citizens and the state. Above all,
it tests the limits of the doctrines which democracies have evolved as a shield
6
PART A
freedom, this case will set the course for the future. Our decision must
address the dialogue between technology and power. The decision will
analyse the extent to which technology has reconfigured the role of the state
and has the potential to reset the lines which mark off no-fly zones: areas
where the sanctity of the individual is inviolable. Our path will define our
freedom itself.
in three strands:
2 Granville Austin, Working a Democratic Constitution: A History of the Indian Experience, Oxford University
Press (2003) at page 6
7
PART A
These three strands are much like the polycentric web of which Lon Fuller has
spoken.3 A pull on one strand shakes the balance between the others. The
validity of the Aadhaar project. The difficulties that Granville Austin had
predicted would arise in harmonising the strands of the “seamless web” are
manifested in the present case. This case speaks to the need to harmonise
welfare state. The Directive Principles are its allies. The state is mandated to
possible a social order in which there is social, economic and political justice.
Government plays a vital role in the social and economic upliftment of the
equal opportunities. These are ideals that are meant to guide and govern
3 Lon L. Fuller and Kenneth I. Winston, The Forms and Limits of Adjudication, Harvard Law Review, Vol. 92,
(1978), at pages 353-409
8
PART A
Part III and a vision of transformative governance in Part IV. Through its rights
jurisprudence, this Court has attempted to safeguard the rights in Part III and
Directive Principles are a reminder of the positive duties which the state has to
its citizens. While social welfare is a foundational value, the Constitution is the
weaved a liberal political order where individual rights and freedoms are at the
heart of a democratic society. The Constitution seeks to fulfil its liberal values
freedoms.
“The Lies That Bind: Rethinking Identity”4, Kwame Anthony Appiah states that
think nothing human alien to me.” Francis Fukuyama, on the other hand has a
distinct nuance about identity. In “Identity: The Demand for Dignity and the
4 Kwame Anthony Appiah, The Lies That Bind: Rethinking Identity, Liveright Publishing (2018).
5 Francis Fukuyama, Identity: The Demand for Dignity and the Politics of Enlightenment, Farrar, Straus and
Giroux (2018).
9
PART A
“large enough to be inclusive but small enough to give people a real sense of
agency over their society.”6. Appiah and Fukuyama present two variants – for
Appiah it has a cosmopolitan and global nature while it is more integrated with
order.
quest for digital India must nonetheless be cognisant of the digital divide.
jurisprudence has expanded privacy rights. A digital nation must not submerge
6 Anand Giridharadas, ‘What is Identity?’, The New York Times, 27 August, 2018.
7 Peter F Drucker, The Age of Discontinuity: Guidelines to Our Changing Society, Harper & Row (1969).
Drucker’s book popularized the term ‘Knowledge Economy’.
8 ‘What is Knowledge Economy?’, IGI Global: Disseminator of Knowledge, available at:
https://www.igi-global.com/dictionary/indigenous-knowledges-and-knowledge-codification-in-the-knowledge-
economy/16327
10
PART A
the identities of a digitised citizen. While data is the new oil, it still eludes the
information age, the Aadhaar project was envisioned and born. The project is
revenue leakages and ensure a more cost and time efficient procedure for
choice. It was made a requirement for state subsidies and benefits for which,
expenses are incurred from the Consolidated Fund of India. It was later
program exists in the world. The Aadhaar project has multifarious aspects, all
9 Krishnadas Rajagopal, ‘Aadhaar in numbers: key figures from UIDAI CEO’s presentation to the Supreme
Court’, The Hindu, (March 22, 2018). Aadhaar enrollment as of March 2018 stood at over 1 billion.
11
PART A
They have been met with an equally strong defence from the government,
12 The Aadhaar project raises two crucial questions: First, are there
if the answer to the first is in the affirmative, how should the balance be struck
crossing the line which divides democracy from authoritarian cultures. At the
heart of the grounds on which the Aadhaar project has been challenged, lies
ways. One of them is in defining and limiting the State’s powers, while
expanding the ambit of individual rights and liberties. It protects citizens from
totalitarian excesses and establishes order between the organs of the State,
between the State and citizens and between citizens. Most importantly, it
reaffirms the position of the individual as the core defining element of the
12
PART A
potential as well as the actual implementation of the Aadhaar project alters the
balance between the state and its citizens in this relational sphere and has the
framework.
framed to balance the rights of the individual against legitimate State interests.
vigilant against State action that threatens to upset the fine balance between
the power of the state and rights of citizens and to safeguard the liberties that
15 The present case involves issues that travel to the heart of our
them is the scope of this Court’s power of judicial review. The Aadhaar
legislation was passed as a money bill in the Lok Sabha. Whether it was
question. The role of the Rajya Sabha in a bicameral legislative structure, the
limits of executive power when it affects fundamental rights and the duty of the
13
PART A
state to abide by interim orders of this Court are matters which will fall for
16 The case is hence as much about the rule of law and institutional
These are some of the unique challenges of this case. They must be analysed
the Aadhaar project, its magnitude and the resultant impact on citizens’
effect of the project. For this will determine the future of freedom.
10 Upendra Baxi, The Right To Be Human: Some Heresies, India International Centre Quarterly, Vol. 13, (1986).
14
PART B
and its content. The decision lays down the test of proportionality to evaluate
18 The protection of privacy emerges both from its status as a natural right
condition for being able to exercise their freedom. The judgment of four judges
15
PART B
16
PART B
rights regime. The individual lies at the core of constitutional focus. The ideals
dignified existence to the individual. The Court held that privacy attaches to
the person and not the place where it is associated. Holding that privacy
protects the autonomy of the individual and the right to make choices, the
It was held that privacy rests in every individual “irrespective of social class or
economic status” and that every person is entitled to the intimacy and
17
PART B
economic rights, the Court held that “conditions necessary for realizing or
freedom.”
18
PART B
Significantly, the Court rejected the submission that there is a conflict between
civil-political rights and socio-economic rights. Both in the view of the Court
22 Privacy, it was held, reflects the right of the individual to exercise control
over his or her personality. This makes privacy the heart of human dignity and
19
PART B
make choices is at the core of the human personality. Its inviolable nature is
for the exercise of most freedoms. As such, given that privacy and liberty are
20
PART B
25 Apart from being a natural law right, the right to privacy was held to be a
indispensable element of the right to life and personal liberty under Article 21
embedded in Part III of the Constitution. Tracing out the course of precedent
in Indian jurisprudence over the last four decades, the view of four judges
holds:
21
PART B
In a similar vein, Chelameswar J. while concurring with the view of four judges
held:
not just by Article 21, but all of Part III of the Constitution. Bobde J. in his
22
PART B
27 Privacy has been held to have distinct connotations including (i) spatial
control; (ii) decisional autonomy; and (iii) informational control. The judgment
23
PART B
Additionally, Bobde J., in his separate opinion held that the right to privacy
may also inhere in other parts of the Constitution beyond those specified in
the judgment:
conception of the ‘self.’ Justice Nariman held that informational privacy “deals
with a person’s mind, and therefore recognizes that an individual may have
24
PART B
opinion held:
not violate the autonomy of an individual. The judgment of four judges noted
the centrality of consent in a data protection regime. This was also highlighted
25
PART B
and limit the power of the state to intrude upon the area of personal freedom.
within the bounds of its authority, the state may have a positive obligation to
26
PART B
that the state must bring into being a viable legal regime which recognizes,
liberty, it was held that the limitations which operate on those rights, under
Article 21, would operate on the right to privacy. Any restriction on the right to
27
PART B
mandate of Article 21. The first requirement is the enactment of a valid law,
legitimate State aim ensures that the law enacted to restrict privacy is
The third requirement of proportionality ensures that the nature and quality of
of the law. Proportionality requires the State to justify that the means which
are adopted by the legislature would encroach upon the right to privacy only to
28
PART B
Justice Chelameswar’s view accepts the ‘fair, just and reasonable’ standard in
not spelt out. They would, as the judge opined, be evolved on a case by case
basis.
29
PART B
34 The Bench of nine judges had held that the contours of privacy exist
Part III. This has enhanced the scope of the protection guaranteed to privacy.
tests applicable apart from those under Article 21. In his concurring opinion,
Any attempt by the State to restrict privacy must therefore meet the
constitutional requirements prescribed for each provision of Part III, which the
30
PART B
recognizes that legitimate state interests may be a valid ground for the
curtailment of the right subject to the tests laid down for the protection of
31
PART B
on the right to privacy. It was held that the State does have a legitimate
important State interest, it was held, lies in ensuring that scarce public
resources reach the beneficiaries for whom they are intended. It was held
thus:
health were demarcated as being part of other legitimate aims of the State.
The judgment places an obligation on the State to ensure that while its
legitimate interests are duly preserved the data which the State collects is
32
PART B
used only for the legitimate purposes of the State and is “not to be utilised
interests and legitimate concerns of the state. Justice Nariman, in his separate
opinion held:
dignity and liberty. A society which protects privacy, values the worth of
33
PART C
C Submissions
a. The Aadhaar programme that operated between 28.01.2009 till the coming
b. The Aadhaar Act, 2016 (and alternatively certain provisions of the Act);
Rules, 2017;
f. All notifications issued under Section 7 of the Aadhaar Act in so far as they
subsidies; and
g. Actions which made Aadhaar mandatory even where the activity is not
Mr Shyam Divan, learned Senior Counsel submitted that the Aadhaar project
i The project and the Act violate the fundamental right to privacy;
34
PART C
the State;
completely post Aadhaar and reverses the relationship between the citizen
vi The procedure adopted by the State before and after the enactment of the
b. UIDAI does not have control over the enrolling agencies and
35
PART C
c. The data collected and uploaded into the CIDR is not verified by any
Mr Kapil Sibal, learned Senior Counsel submits that the provisions of the
v Collection and storage of data with the government under the Aadhaar Act
36
PART C
privacy and personal dignity and bodily Integrity envisaged under Article
vii Section 7 of the Aadhaar Act is applicable only to such subsidies, benefits
and services, for which the entire expenditure is directly incurred from the
Consolidated Fund of India or from which the entire receipts directly form
viii Use of Aadhaar as the sole identity will not prevent pilferage and diversion
of funds and subsidies, as faulty identification is only one of the factors that
ix The Aadhaar project conditions the grant of essential benefits upon the
submissions:
37
PART C
Subramanian Swamy48;
fundamental rights;
Act;
viii The Aadhaar Act violates Part IX of the Constitution, which provides for
38
PART C
7 and 51 of the Aadhaar Act, and is also ultra vires of the provisions of
unreasonable classification;
b The impugned Rules are violative of Article 19(1)(g) as the Rules refer
39
PART C
d The Rule has no nexus to the object of the PMLA Act, as the Act has
ii Section 139AA of the Income Tax Act, 1961 is liable to be struck down as
guidelines under Article 142 to protect inter alia, the right to privacy and to
v If the Aadhaar project is not struck down, it should be confined only for
vi Sections 2(g), 2(j) 7, 57 and 59 of the Aadhaar Act violate Articles 14, 21
residence.
49(2017) 7 SCC 59
40
PART C
i The only difference between financial bills and money bills is the term
“only” in Article 110 of the Constitution which implies that the scope of
money bills is narrower than the scope of financial bills and provisions
ii The Aadhaar Act, which was passed as a money bill, should be struck
the nature of a Money Bill and bear no nexus to the Consolidated Fund of
India;
iii Since Money Bills can only be introduced in the Lok Sabha, on account of
the curtailment of the powers of the Rajya Sabha and the President, the
iv While Article 110(3) provides that the decision of the Speaker of the Lok
only with regard to the Parliament and does not exclude judicial review;
and
v Since the legislative procedure is illegal and the power of the Rajya
41
PART C
Aadhaar bill, provisions of the Act cannot be severed to save the Act and
submissions:
i All acts done prior to the passage of the Act are void ab initio and are not
ii Collection, storage and use of data under the Aadhaar project and Act
a. The Aadhaar Act and the surrounding infrastructure has made the
decisional autonomy;
disproportionate;
42
PART C
and
data.
iii Services like health related services, and those related to food, pensions
and daily wages claimed under Section 7 of the Act have been denied
Thus, the State needs to take steps to prevent the denial of benefits by
the Aadhaar number, which violates the principles of natural justice; and
v Sections 2(g), 2(j), 2(k) and 23(2) of the Aadhaar Act suffer from
43
PART C
i The Aadhaar project extends far beyond the scope of the Aadhaar Act
and 21;
iii The lack of security in the Aadhaar project violates the right to privacy
constitutionally invalid.
data, and the ensuing possibility of surveillance by the State has a chilling
44
PART C
iii The Aadhaar project does not contain any specific provisions for data
violation of the obligation of the State to ensure that the right to life,
liberty, dignity and privacy of every individual is not breached under Part
submissions:
i The Aadhaar Act fails to satisfy the constitutional test of a just, fair and
reasonable law;
by the State;
45
PART C
v Sections 2(g) and 2(j), the proviso to Section 3(1), Section 23(2)(g) and
Section 23(2)(n) read with Section 54(2)(l), and Section 29(4) of the Act
Mr CU Singh, learned Senior Counsel, argued that the rights of the child are
violated through the Aadhaar project. A child has no right to give consent or to
enter into a contract. A child in India, under law, has no power or right to bind
homeless people who are denied benefits due to the lack of a fixed abode.
Mr Sanjay Hegde, learned Senior Counsel has urged that since there is no
organization for transgender persons and sexual minorities urged that the
46
PART C
require demographic information. The enrolment form has a third gender, but
there is no uniformity across the board, and the documents that have to be
produced to get an Aadhaar card do not always have that option. Aadhaar is
being made mandatory for almost everything but transgender persons cannot
get an Aadhaar because they do not have the gender identity documents that
i. For the period prior to coming into force of the Aadhaar Act, because of
any right;
ii. Section 59 of the Aadhaar Act protects all actions taken from the period
47
PART C
iii. The judgments in MP Sharma and Kharak Singh being those of 8 and 6
Puttaswamy would be per incuriam. Hence, the State need not have
proceeded on the basis that a law was required for the purpose of getting
iv. Subsequent to the Aadhaar Act, the petitioners would have to establish
that one or more of the tests laid down by the nine judge bench in
satisfied and hence the Aadhaar Act is not unconstitutional for the
following reasons:
satisfied;
the Act;
48
PART C
“rational nexus” exists between the objects of the Act and the means
the Court must take note of the fact that each one of the subsidies and
Constitution - such as the right to live with human dignity, the right to
education. If these rights are juxtaposed with the right to privacy, the
v. The Aadhaar Act was validly passed as a Money Bill on the following
grounds:
funds from the Consolidated Fund of India, which brings the Aadhaar
Act within the purview of a Money Bill under Art. 110 of the Constitution;
b. Sections 7, 24, 25 and the Preamble of the Act also support its
c. The Aadhaar Act has ancillary provisions, but they are related to the
d. Section 57 of the Act is saved by Article 110 (1) (g) of the Constitution as
49
PART C
(1) (g).
i. Section 139AA of the Income Tax Act, was examined in Binoy Viswam
in the context of Article 19 and fulfills the three tests laid down under
duplicate PAN cards, and the linking of Aadhaar to the PAN card will
ensure that one person holds only one PAN Card, thereby curbing
50 (2017) 9 SCC 1
50
PART C
fundamental rights;
d. The Court must not interfere with the Legislature’s wisdom unless the
to be achieved;
amendments to inter alia the Income Tax Act and the PMLA Act and
f. Statutory provisions under Aadhaar Act and Income Tax Act are distinct
courts; and
Aadhaar number to open a bank account is not ultra vires the Aadhaar
Act. Similarly, the Rule that an existing bank account will become non-
51
PART C
launderers non-operational.
iii. Fundamental rights are not absolute and can be restricted if permitted
proportionate;
iv. The Aadhaar Act does not cause exclusion because if authentication fails
after multiple attempts, then the subsidies, benefits and services, can be
52
PART C
life and personal liberty; to ensure justice (social, political and economic)
and to eliminate inequality (Article 14) with a view to ameliorate the lot of
vi. Socio-economic rights must be read into Part III of the Constitution since
economic rights;
vii. A welfare State has a duty to ensure that each citizen has access at least
necessities in life. There cannot be any dignity for those who suffer
53
PART C
viii. The Aadhaar number does not convert individuals to numbers. The
that purpose. The petitioners have conflated the concepts of identity and
ix. Even if there is a conflict between the right to privacy and the right to food
and shelter, the Aadhaar Act strikes a fair balance. The Aadhaar Act
ensures human dignity and the right to life and liberty, hence there would
does not presume that all its citizens are dishonest. The provisions of the
xi. The “least intrusive test” is not applicable in the present case. The
requirement that the least intrusive means of achieving the State object
54
PART C
xii. Even assuming that the ‘least intrusive method’ test applies, the exercise
Aadhaar card, have not established that smartcards are less intrusive
xiv. The ‘strict scrutiny test’ does not apply to the Aadhaar Act. That test is
classifications’;
xv. Section 7 of the Aadhaar Act does not involve any waiver of fundamental
rights;
xvi. There can be no assumption of mala fide against the government or the
Aadhaar Act;
xvii. Through Section 57, Parliament intended to make the use of the Aadhaar
and public sector. Many private corporate bodies are operating parallel to
55
PART C
defence, and health. These are core sectors absolutely essential for
xviii. Sections 2(g), and (j) read with Section 54(2)(a) and Section 54(1) do not
power of the Authority under the Act is limited by the use of the
they are non-intrusive; thirdly, apart from carrying out authentication they
do not reveal any other information of the individual; fourthly, these are
54, must mandatorily be laid before the Parliament under Section 55. This
56
PART C
the person are excluded. The term ‘other relevant information’ has to be
country and most of the other identity documents do not enjoy the quality
of portability;
xxi. The enrolment and authentication processes under the Aadhaar Act are
xxii. The security of the CIDR is also ensured through adequate measures and
safeguards;
xxiii. The Aadhaar Act ensures that UIDAI has control over the requesting
ways:
57
PART C
procedure for making request for such access and details of the
individual.
xxv. When an individual makes a choice to enter into a relational sphere then
whom they wish to relate. This is more so where the individual seeks
xxvi. The Central government has the power to direct the linking of Aadhaar
58
PART C
b. The Aadhaar Act does not involve big data or learning algorithms. It
reveal anything about the individual. Section 2(d) of the Act defines
of authentication; and
59
PART C
xxix. On the control exercised by the Authority over the Requesting Entities
Constitution;
Authority also providing the hardware and software of the device. The
Authority before being used by the RE. The Authority also takes
c. The license is given to the RE from the Authority only after an audit of
the REs by the Authority as there exists a statutory bar from sharing
Biometric information under Sections 29 (1) (a) and 29(4) of the Act.
60
PART C
xxx. UIDAI has entered into licensing agreements with foreign biometric
solution providers (BSP) for software. Even though the source code of the
to it;
xxxi. Prior to the enactment of the Aadhaar Act, the Aadhaar project was
xxxii. The architecture of the Aadhaar Act does not enable any real possibility,
Act as it has a direct and proximate nexus to public order and security of
the State;
61
PART C
vires Article 243-G and items 11, 12, 16, 17, 23, 25 and 28 of the XIth
Schedule;
that the provisions of the Act would not prevent the use of Aadhaar for
other purposes;
purposes, that the use must be sanctioned by any law in force or any
contract;
says that the use of the Aadhaar number shall be subject to the
d. Under Section 57, the State, a body corporate or any other person
62
PART C
f. The expressions ‘pursuant to any law or any contract’, and ‘to this
effect’- necessarily entail that where the State makes a law or any
Requesting Entities under Section 57, as they will not meet the
xxxvi. The Aadhaar Act is not exclusionary but inclusionary since it provides
submissions:
63
PART C
ii. Private entities and AUAs/KUAs that have built their businesses around it
customers;
iv. Aadhaar authentication has benefited women in villages and migrants and
financing; and
v. A statute cannot be struck down on the ground that there is scope for
misuse.
Mr Jayant Bhushan, learned Senior Counsel appearing for the Reserve Bank
i. RBI, in exercise of its powers under the Banking Regulation Act, 1949
and Rule 9 of the PMLA Rules, 2005 issued an amended Master Circular
64
PART C
ii. Rule 9(14) of the PMLA Rules provides that the Regulator- the RBI in this
identity; and
i. The Aadhaar Act as a whole does not violate the fundamental right to
privacy;
ii. The factors that save the Aadhaar Act from failing the proportionality test
v. In view of the large scale enrolments that have already taken place and
65
PART C
undertake the mammoth enrolment task all over again under a new
vi. Certain provisions of the Aadhaar Act have to be struck down or read
down so that the Act as a whole can continue to serve its essential
purpose - namely Sections 47, Section 8(4) and Section 29(2) of the Act;
and
vii. Section 139AA of the Income Tax Act, 1961 violates Article 14 and 21 of
the Constitution.
pendency of the petitions for 6 years before this Court and therefore, the
66
PART C
maintainable;
and inclusion of Aadhaar does not in any manner increase the threat
to privacy;
customers; and
c. REs have data of their own customers and not of other REs’
and 29 along with Chapter VII which deals with Offences and Penalties,
procedure for disclosure. Even though the Aadhaar Act is not required to
meet the same standard as laid down in PUCL, the safeguards in the Act
authentication records, but far exceed the safeguards laid down PUCL;
67
PART C
iv. The petitioners cannot contend that Section 33(2) of the Aadhaar Act
does not define the term “national security”) for the following reasons:
v. The laws, which are under challenge, are a part of a concerted scheme to
furtherance of Articles 14, 38, 39B and 39C. These laws ensure a more
transparent and a cleaner system, root out revenue leakages and evasion
subsidies;
vi. The object of the Aadhaar Act, contrary to what the petitioners have
incidental effect, if at all, would not implicate the right under Article
19(1)(a);
vii. The petitioners cannot contend that Section 47 of the Aadhaar Act is
68
PART C
a. The offences and penalties under the Act are intended to maintain the
purity of data of the Aadhaar number holder and the integrity of the
c. The individual has not been left remediless, as he/she can make a
viii. Aadhaar must be made mandatory under Section 7 of the Aadhaar Act for
one person to obtain two Aadhaar numbers. This will help in checking
the entry of fake and duplicate beneficiaries into any welfare scheme;
b. Other methods which were employed over the last 70 years to check
69
PART C
made voluntary, the same problems are likely to creep back into the
system; and
resources.
ix. There is no conflict between the Aadhaar Act and the Income Tax Act as
they are both stand alone laws and their scope of operation is different;
x. Through the Aadhaar Act, the State is furthering the following obligations
under Part III and Part IV of the Constitution and international obligations:
like the basic right to food, shelter and livelihood of people arising out
b. The Supreme Court has observed that civil & political rights and socio-
this context;
70
PART C
c. Articles 38, 39(b), (c), (e), (f), 41, 43, 47 and 51(c) impose a
the general public and not from the perspective of an individual right
xii. With regard to the alleged conflict between Section 29(2) of the Aadhaar
Act and Section 4(b)(xii) of the RTI Act, the former cannot be struck down
52 Modern Dental College and Research Centre v State of Madhya Pradesh, (2016) 7 SCC 353.
71
PART D
provisions are different, as the public authority under the RTI Act can
publish the details of beneficiaries from the existing database and the
c. The two laws operate in their distinct fields and there is no conflict
72
PART D
repository of data known as the Central Identities Data Repository (CIDR). The
number. The latter part of the legislative design consists of the process of
‘authentication’.
Section 2(a) as the identification number issued to the individual under sub-
Section 2(d) speaks of the ‘authentication record’ as the record of the time of
authentication, the identity of the requesting entity and the response provided
53 Section 2(m) states: “enrolment” means the process, as may be specified by regulations, to collect
demographic and biometric information from individuals by the enrolling agencies for the purpose of issuing
Aadhaar numbers to such individuals under this Act.
73
PART D
...
...
is defined as information related to the name, date of birth and address and
Section 2(g), of the photograph, fingerprint, Iris scan, or other such biological
74
PART D
information. The CIDR is the backbone of the Aadhaar Act. All the information
collected or created under the Act is stored in it. For the establishment and
maintenance of the CIDR, it has been provided54 under the Act that UIDAI may
engage one or more entities, which can also perform any other functions as
may be specified by regulations. The Act does not prohibit the engagement of
75
PART D
right contemplates a liberty, for it is in the exercise of the liberty that the
55 Section 2(v) states: “resident” means an individual who has resided in India for a period or periods amounting
in all to one hundred and eighty-two days or more in the twelve months immediately preceding the date of
application for enrolment
76
PART D
enrolling agency need not be an entity of the state. The definition opens the
information for the process of enrolment. The enrolling agencies have to set
three important facets. The first is the manner in which the information which
is disclosed by the individual would be used. The second relates to the nature
of the recipients with whom the information is likely to be shared during the
access to the information disclosed. All these three facets are crucial to the
the information which is disclosed is going to be used and with whom the
56 Section 2(s) states: “Registrar” means any entity authorised or recognised by the Authority for the purpose of
enrolling individuals under this Act
57 Regulation 7, Aadhaar (Enrolment and Update) Regulations, 2016
77
PART D
of the design created by the statute. These three facets are conditions
individual does so, he or she must have a full disclosure which would enable
Aadhaar number. The first is that the number is unique to one individual and
number can be accepted as proof of identify of its holder “for any purpose”.
58 Section 3(2), Aadhaar Act.
78
PART D
not have permanent places of abode and to other categories which may be
the authority may require holders to update their demographic and biometric
enabling provision has been made by which the Union or state governments
may require proof of an Aadhaar number for receiving subsidies, benefits and
services for which the expenditure is incurred from (or the receipts form part
79
PART D
services that are charged to the Consolidated Fund of India; the connect being
benefit or service for which the expenditure is incurred or the receipts form
part of the Consolidated Fund of India. Where the purpose and condition are
fulfilled, the central or state governments may require that the individual
80
PART D
the Aadhaar number has not been assigned. Three alternatives are stipulated
in Section 7. Where the purpose and condition (noted above) are fulfilled, the
Aadhaar number has not been assigned to the individual, he or she would
number has been assigned as yet, the proviso stipulates that alternate and
an enabling power by which the central or state governments may make the
81
PART D
the receipt of which forms part of the Consolidated Fund of India. Section 7
by the repository on the basis of the information available with it. Under sub-
This definition also does not prohibit the engagement of private agencies for
Moreover, the requesting entity must ensure that the identity information is
submitted only for the purpose of authentication to the CIDR. Before the
a mandate of law to disclose (i) the nature of the information that may be
shared upon authentication; (ii) the use to which information received during
83
PART D
information; (ii) a one-time password with limited time validity; (iii) biometrics
48 UIDAI is the umbrella entity under the Aadhaar Act. The statutory
been provided under Chapter IV of the Act. Section 11 provides that the
perform such other functions as are assigned to it under the Act. The
policy, procedure and systems for issuing Aadhaar numbers to individuals and
84
PART D
85
PART D
collect such fees for the services provided by them under this
Act in such manner as may be specified by regulations;
consistent with the Act, for carrying out the provisions of the Act. Sub-section
(2) of Section 54 provides that UIDAI may make regulations covering any of
86
PART D
(h) the time and places of meetings of the Authority and the
procedure for transaction of business to be followed by it,
including the quorum, under sub-section (1) of section 19;
(i) the salary and allowances payable to, and other terms and
conditions of service of, the chief executive officer, officers
and other employees of the Authority under sub-section (2) of
section 21;
87
PART D
(w) the manner of and the time for maintaining the request for
authentication and the response thereon under sub-section
(1), and the manner of obtaining, by the Aadhaar number
holder, the authentication records under sub-section (2) of
section 32;
Section 11(1), read with Sections 23(2) and 54(2), indicates that UIDAI is the
sole authority vested with the power and responsibility of carrying out
individuals;
(vi) specifying the manner of use of Aadhaar numbers for the purposes of
purposes;
88
PART D
(ix) setting up facilitation centres and mechanisms for the redressal of the
providers; and
The Act does not set any limits within which the sole authority of UIDAI may
the above provisions. The architecture of Aadhaar keeps UIDAI at the centre
of all processes.
functions in relation to it, as may be necessary for the purposes of the Act
89
PART D
(Section 23 (3) (b)). For the efficient discharge of its functions, UIDAI may also
23(4)). These, like many other provisions, open the scope for the involvement
of private entities in the Aadhaar project. This is also evident from Section 57
of the Act, which allows the use of the Aadhaar number, by the state,
information is permitted by the Act.64 Section 28(3) requires UIDAI to take all
access, use or disclosure not permitted under the Act or regulations, and
90
PART D
Except where it has otherwise been provided in the Aadhaar Act, a burden is
placed (under Section 28(5)) upon UIDAI, its officers, other employees
(whether during service or thereafter), and any agency that maintains the
91
PART D
Sub-section (2) contemplates that the identity information, other than core
biometric information, collected or created under the Act may be shared only in
accordance with the provisions of the Act and in the manner as may be
specified by regulations.
that any identity information available with it, is neither used for any purpose,
other than that specified to the individual at the time of submitting identity
information for authentication; nor disclosed further, except with the prior
biometric information. The provision dilutes the protection that should be given
UIDAI to maintain authentication records in the manner and for a time period
92
PART D
entity under its control) to collect, keep or maintain any information about the
purpose of authentication.
93
PART D
The Aadhaar Act provides two categories: a “court order” and “in the interest of
disclosed.
UIDAI to make an alteration in his or her record in the CIDR in the manner
Aadhaar number holder and to intimate the alteration to the holder. Sub-
CIDR except in the manner provided in the Act or regulations made in this
behalf.
penalty has been provided for impersonation at the time of enrolment. Section
94
PART D
enrolment or authentication).
Under Section 38, a penalty for unauthorised access to the CIDR has been
95
PART D
Section 39 imposes a penalty for tampering with data in the CIDR. Sections 40
act in contravention of the obligations imposed upon them under the Act.
Section 42 provides for a general penalty for an offence under the Act or the
under the Act. Under Section 43, when an offence has been committed by a
company, every person who at the time the offence was committed was in
charge of, and was responsible to the company for the conduct of the business
Section 44 indicates that the provisions of the Act would apply to any offence
nationality. The power to investigate offences under the Act has been placed,
under Section 45, on a police officer not below the rank of Inspector of Police.
Section 47(1) of the Act puts a bar on the courts from taking cognizance of any
offence punishable under the Act, except when a complaint is made by UIDAI
or any officer or person authorised by it. The provision indicates that the scope
of cognizance is limited. It does not allow an individual who finds that there is
any violation under the Act, to initiate criminal proceedings. The scope of
grievance redressal under the Act is restrictive and works only on the action of
96
PART D
UIDAI itself. The right of an individual to seek remedy under the Act if his/her
of its functions under the Act, shall be bound by the written directions on
UIDAI to delegate to any member, officer or any other person, its powers and
functions under the Act (except the power under section 54) as it may deem
Section 55 requires every rule and regulation made under the Aadhaar Act to
Every rule and every regulation made under this Act shall be
laid, as soon as may be after it is made, before each House
of Parliament, while it is in session, for a total period of thirty
days which may be comprised in one session or in two or
more successive sessions, and if, before the expiry of the
session immediately following the session or the successive
sessions aforesaid, both Houses agree in making any
modification in the rule or regulation, or both the Houses
agree that the rule or regulation should not be made, the rule
or regulation shall thereafter have effect only in such modified
form or be of no effect, as the case may be; so, however, that
97
PART E
contending that it could not have been passed as a Money Bill. According to
the submission, the Aadhaar Act did not qualify as a Money Bill under Article
110 of the Constitution, and it legislates on matters which fall outside that
provision. The Attorney General for India submitted that the Constitution
Bill and hence the question whether the Aadhaar Act fulfils the requirements
of being categorized as Money Bill is not open to judicial review. The Attorney
General also urged that the Aadhaar Act does fall under Article 110.
98
PART E
(i) Whether under Article 110(3), the decision of the Speaker of the Lok
99
PART E
(ii) If the answer to (i) is in the negative, whether the Aadhaar Act is a Money
(iii) If the Bill to enact the Aadhaar Act was not a Money Bill, whether a
provides that a Money Bill shall not be introduced in the Council of States, the
Rajya Sabha. After a Money Bill is introduced in the Lok Sabha and passed by
it, the Bill has to be transmitted to the Rajya Sabha for its recommendations.
Article 110(4) provides that when a ‘Money Bill’ is transmitted from the Lower
Speaker of the Lower House that it is a Money Bill. From the date of the
receipt of the Money Bill, the Rajya Sabha is bound to return the Bill to the Lok
Sabha, within a period of fourteen days, with its recommendations. The Lok
Sabha has the discretion to “either accept or reject all or any of the
recommendations” made by the Rajya Sabha.67 If the Lok Sabha accepts any
have been passed by both Houses of the Parliament “with the amendments
100
PART E
However, when the Lok Sabha “does not accept any of the recommendations”
of the Rajya Sabha, the Money Bill is said to have been passed by both
Houses in the form in which it was originally passed by the Lok Sabha.69 If a
Money Bill after being passed by the Lok Sabha and transmitted to the Rajya
Sabha for its recommendations is not returned to the Lok Sabha within a
period of fourteen days, it is then deemed to have been passed by both the
Houses of the Parliament in the form in which it was originally passed by the
Lok Sabha.70 When a Money Bill has been passed by the Houses of the
the Lok Sabha Speaker’s certificate for assent71. Article 117(1) also provides
that a Bill “making provision for any of the matters specified in sub-clauses (a)
to (f) of clause (1) of article 110” shall also not be introduced in the Rajya
Sabha.
a special procedure for Money Bills in the state legislative assembly. Article
199(3) provides for the finality of the decision of the Speaker of the Legislative
Assembly. Under Article 200, when a Money Bill has been passed by the
101
PART E
Article 107 contains provisions for the introduction and passing of Bills in
58 Ordinary bills can be passed only when they are agreed to by both
both the Houses for the bill to be passed. Both Houses of Parliament have a
Deviating from the important role which it assigns to the Rajya Sabha in the
passage of legislation, the Constitution carves out a limited role for the Rajya
Sabha in the passage of a Money Bill. Ordinary bills (other than Money Bills)
102
PART E
passage. A Bill is not regarded as being passed by Parliament until both the
Sabha to decide whether a Bill is a Money Bill. When the Speaker of the Lok
Sabha declares a Bill to be a Money Bill, the Rajya Sabha is left only with the
days. Being only recommendations, they do not bind the Lok Sabha. They
the limited role that the Upper House has in the passing of a Money Bill can
Kingdom are older than the Parliament Act of 1911. The authoritative
103
PART E
relationship between the House of Commons and the House of Lords with
public expenditure.74
A grant imposed by the House of Commons would become law in effect, only
after the assent of the House of Lords and of the Queen.75 While the House of
Commons enjoyed the legal right to originate grants for nearly 300 years, the
House of Lords was originally not precluded from amending a Bill. But in
curtail the powers of the House of Lords so that only the Commons had the
sole right to direct or limit the scope of a Bill regarding taxation and
government expenditure. The House of Lords was excluded from altering any
such Bill.
The exclusion of the Lords was so strictly followed that the Commons even
denied to the former, the power of authorising the taking of fees, imposing
73 Thomas Erskine May, A treatise on the law, privileges, proceedings and usage of Parliament, Ninth Edition
(1883)
74
Ibid, at pages 637-638. It notes: “At length, when the Commons had increased in political influence, and the
subsidies voted by them had become the principal source of national revenue, they gradually assumed their
present position in regard to taxation and supply, and included the Lords as well as themselves in their grants.
So far back as 1407, it was stated by King Henry IV, in the ordinance called “The Indemnity of the Lords and
Commons”, that grants were “granted by the Commons, and assented to by the Lords”.”
75 Ibid, at page 638
76 Ibid, at page 641. The Resolution stated: “That in all aids given to the king by the Commons, the rate or tax
of the Commons ; and all bills for the granting of any such aids and supplies ought to begin with the Commons
: and that it is the undoubted and sole right of the Commons to direct, limit, and appoint in such bills the ends,
purposes, considerations, conditions, limitations, and qualifications of such grants ; which ought not to be
changed or altered by the House of Lords.”
104
PART E
them when recovered, though such provisions were necessary to give effect
to the general enactments of a Bill.78 Since this strict enforcement was found
Standing Order in 1849 which accommodated space to the House of Lords for
Act of 1911, which essentially deprived the House of Lords of the right to
relations between the two Houses of Parliament”80. The Preamble of the Act
indicates that it was enacted for “restricting the existing powers of the House
of Lords”81. Section 1(1) provides for the power of the House of Lords on
Money Bills:
“Money Bill” was defined statutorily for the first time. Section 1(2) provided:
105
PART E
The use of the expression “means” in the definition of a Money Bill indicates it
was exhaustively defined. A Bill would be a Money Bill, if the Speaker of the
Under Section 1(3), when a Money Bill is sent up to the House of Lords and to
provides that before giving his certificate, the Speaker may consult “two
any bill which in his or her opinion falls within the definition of a Money Bill.
Any bill containing provisions outside the definition would not be certified as a
Money Bill. The Speaker does not certify a Bill until it has reached the form in
which it will leave the House of Commons, that is, at the end of its Commons
106
PART E
stage. The Speaker can only decide whether or not to certify a Bill once it has
Section 3 of the 1911 Act provides finality to the certificate issued by the
The Act provides finality to the decision of the Speaker of the House of
Commons. By using the phrase “shall not be questioned in any court of law”,
the Act grants immunity to the Speaker’s decision from judicial review.
The statutory concept of a ‘Money Bill’ and the Speaker’s certification of a Bill
as a ‘Money Bill’ introduced by the Parliament Act, 1911 ultimately found its
from the Commonwealth of India Bill 1925, which was drafted by a National
82 House of Lords, Select Committee on the Constitution, Money Bills and Commons Financial Privilege (2011),
available at https://publications.parliament.uk/pa/ld201011/ldselect/ldconst/97/97.pdf
107
PART E
(b) Bills imposing taxation· shall deal only with the imposition
of taxes, and any provision therein dealing with any other
matter shall be of no effect.
(c) Bills for the appropriation of revenues or moneys or
imposing taxation shall be introduced only by a member of
the Cabinet, and can only originate in the Legislative
Assembly.”
The Bill neither provided a definition of a Money Bill nor did it discuss the role
response to the setting up of the Simon Commission (which did not have any
Constitution for India. With Motilal Nehru as the Chairman of the Committee
The definition of a Money Bill in the Nehru Report, was drawn from the
Parliament Act, 1911 in Britain. Article 18 of the Report provided that the
108
PART E
(the Lower House) was provided the final authority to either accept or reject
While the Constituent Assembly of India was in session, the Socialist Party of
India came up with a “Draft Constitution of the Republic of India”, based on its
109
PART E
Speaker of the Lower House, and in his absence, on the Deputy Speaker, to
64 There was another model present before the makers of the Indian
of India Act, 1935, which provided for two Houses of Parliament − the Council
the Government of India Act 1935 made special provisions for financial bills:
Under the 1935 Act, there was no provision for a Speaker’s certificate
regarding a Financial Bill. Section 38(1) authorized each House to make rules
regulating its procedure and for the conduct of its business, subject to the
110
PART E
to Money Bills which it would have considered while formulating its drafts.
of the Union consisting of the President and two Houses—the Senate and the
of the Union Constitution Committee was that “Money Bills would originate in
the House of the People and the power of the other House would be limited to
making suggestions for amendment, which the House of the People could
accept or reject”.84 B Shiva Rao has recorded what transpired during the
83 B Shiva Rao, The Framing of India’s Constitution: A Study, Indian Institution of Public Administration (1968), at
page 420
84 Ibid
111
PART E
draft of the Constitution provided that “if any question arises whether a Bill is a
‘money bill’ or not, the decision of the Speaker of the House of the People
Administration (2012), at page 32, as quoted in Pratik Datta, Shefali Malhotra & Shivangi Tyagi, Judicial
Review and Money Bills, NUJS Law Review (2017)
88 Ibid
112
PART E
has a similar provision which accords legal finality to the decision of the
67 The draft prepared by the Advisor to the Constituent Assembly did not
adopt the above provision in its entirety. It adopted the part on the finality of
the certification of the Speaker on whether a Bill is a Money Bill. The Irish
113
PART E
Certification of any Bill by the Speaker of the Lower House as a Money Bill,
68 The final provision which has assumed the form of Article 110 of the
Constitution, does not contain the exact language used in the Act of 1911.
The 1911 Act of the British Parliament consciously excluded judicial review of
the certificate of the Speaker of the House of Commons. The intention of the
British Parliament is clear from the specific language used in Section 3 of the
Act. Section 3 accords finality to the decision of the Speaker by providing that
for all purposes, and shall not be questioned in any court of law”. The
review. The framers of the Indian Constitution did not adopt this language.
91 B Shiva Rao, The Framing of India’s Constitution: Selected Documents, Indian Institution of Public
Administration, at page 281
114
PART E
Rather, they chose to adopt the phrase “shall be final”. The phrase used in the
Act of 1911 expressly excluded courts from exercising their power of judicial
review over the decision of the Speaker of the House of Commons. This
language was used in the 1911 Act to put an end to the constitutional
Britain for more than five hundred years, leading to the enactment of the 1911
Act.92 The deviation from incorporating the language, used in the 1911 Act,
makers that they did not want to confer the same status on the power
the House of Commons. Had their intention been otherwise, they would have
used the same language as that provided under the 1911 Act. Finality would
92 Pratik Datta, Shefali Malhotra & Shivangi Tyagi, Judicial Review and Money Bills, NUJS Law Review (2017)
93 (2018) 7 SCC 1
115
PART E
Speaker of the Lok Sabha from judicial review, for this reason. The
Constitution makers have envisaged a role for the judiciary as the expounder
guardians of the Constitution and its values. Constitutional courts have been
parameters. Judicial review protects the principles and the spirit of the
116
PART E
must give way to duties and compliance with the rule of law. Constitutional
institutions cannot be seen as focal points for the accumulation of power and
privilege. They are held in trust by all those who occupy them for the moment.
the institutions which it creates. The office of the Speaker of the House of
People, can be no exception. The decision of the Speaker of the Lok Sabha in
certifying a Bill as a Money Bill is liable to be tested upon the touchstone of its
sets the limits for each institution. Our constitutional scheme envisages a
system of checks and balances. The power of the Speaker of the Lok Sabha,
contention that the decision of Speaker is immune from judicial review and
phrase “shall be final” used in Article 110(3) has been adopted, as mentioned
the Irish Constitution provide a mechanism for review of the certificate issued
117
PART E
the members of the Upper House of the Irish Parliament can request the
Committee, the decision of the Committee stands “final and conclusive”. The
members of the Constituent Assembly did not adopt this mechanism. Absence
of this mechanism does not mean that the decision of the Speaker of the Lok
an indispensable facet. The Speaker has to act within the domain, which the
Constitution accords to the office of the Speaker. The power conferred on the
Speaker of the Lok Sabha cannot be exercised arbitrarily, for it could damage
ensure that the Speaker does not act beyond constitutional entrustment.
the Lower House to the Upper House, it should be endorsed by the Speaker’s
Lower House”. Therefore, the finality provided to the decision of the Speaker
controversy on the issue in the Rajya Sabha and before the President. Had it
been intended to prevent the court from adjudicating upon the validity of the
118
PART E
decision of the Speaker, the language of the Article would have made it
judicial review, clear words to that effect are used. Articles 243O(a) 96,
243ZG(a)97 and 329(a) specifically use the phrase − “shall not be called in
Namakkal, Salem District98, a six judge Bench of this Court, while construing
the provisions of Article 329, compared it to the preceding Articles, and held
thus:
96 Article 243O(a), which is a part of the chapter on Panchayats, provides: “Notwithstanding anything in this
Constitution,— (a) the validity of any law relating to the delimitation of constituencies or the allotment of seats
to such constituencies, made or purporting to be made under article 243K, shall not be called in question in any
court.”
97 Article 243ZG(a), which is a part of the chapter on Municipalities, provides: “Notwithstanding anything in this
Constitution,— (a) the validity of any law relating to the delimitation of constituencies or the allotment of seats
to such constituencies, made or purporting to be made under article 243ZA shall not be called in question in
any court.”
98 1952 SCR 218
99 Ibid, at para 5
119
PART E
the case of other constitutional provisions, the words “shall be final” have been
the Tenth Schedule102 contain the phrase “shall be final”. In Union of India v
Jyoti Prakash Mitter103, this Court held that it can examine the legality of an
the High Court under Article 217 (3) of the Constitution. The six judge Bench
held:
practicable to hold such inquiry as is referred to in clause (2), the decision thereon of the authority empowered
to dismiss or remove such person or to reduce him in rank shall be final.”
102 Paragraph 6(1) states “If any question arises as to whether a member of a House has become subject to
disqualification under this Schedule, the question shall be referred for the decision of the Chairman, or, as the
case may be, the Speaker of such House and his decision shall be final:
Provided that where the question which has arisen is as to whether the Chairman or the Speaker of a House
has become subject to such disqualification, the question shall be referred for the decision of such member of
the House as the House may elect in this behalf and his decision shall be final.”
103 (1971) 1 SCC 396
104 Ibid, at page 397
120
PART E
The question of finality under Article 311(3) was dealt with by a Constitution
Bench of this Court in Union of India v Tulsiram Patel105. The Court held that
the finality given to the decision of the disciplinary authority by Article 311(3)
that it is not reasonably practicable to hold an enquiry, is not binding upon the
the power vested in the Speaker or the Chairman under the Schedule, is a
121
PART E
paragraph 6(1) of the Tenth Schedule were held not to exclude judicial review
entrusted to the Speaker to certify a Bill as a Money Bill under Article 110(3),
to which the attributes of a judicial power do not apply. Indeed, the power
legislative process. But, the fact that the authority which a constitutional
the conclusion that a finality clause governing the exercise of that power
makes it immune from judicial review. Where the entrustment of the power is
there has been a violation of a constitutional mandate. The nature and extent
of judicial review would undoubtedly vary from a situation where finality has
122
PART E
that the Bill did not fulfil the conditions stipulated in Article 110(1) to be
scrutinized.
origin. Law under a colonial regime was not just an instrument to maintain
absolute authority was but a reflection of the premise that those who ruled
could not be questioned. Those who were ruled had to accept the authority of
normative foundations of colonial law and history. The notion that power is
functions to public functionaries to the restraints which accompany it. Our law
must recognise the need to liberate its founding principles from its colonial
past. The Court should not readily accept the notion that the authority vested
exclusion of review is necessary to fulfil the overarching need for the proper
123
PART E
an excess of power from being questioned before the Court. Nor is the fact
The ultimate test is whether the exclusion of judicial review is express and
interpretation of the Constitution must subserve the need to liberate it from its
colonial detritus.
This approach was adopted by a seven judge Bench of this Court in Krishna
power of the Governor, the Court held that the interpretation of the
what the framers of our Constitution intended it to be. The Bench held:
124
PART E
“constitutional necessity”.
76 The marginal note to Article 122 is: “Courts not to inquire into
This Court must deal with the question whether the Speaker’s decision under
Article 110(3) is protected by Article 122. Article 122 prohibits courts from
the Constitution. The marginal note to Article 118 provides for “Rules of
125
PART E
77 Articles 118 to 122 are covered under the rubric of the general heading-
House of Parliament for regulating the procedure and conduct of its business.
Constitution. The provision does not indicate that these rules will stand above
the Constitution. They are, on the contrary, subject to the Constitution. The
rules framed under Article 118, are procedural in nature. The procedure
which has to be fulfilled according to the norms set out in Article 110. Article
122 will not save the action of the Speaker, if it is contrary to constitutional
norms provided under Article 110. The Court, in the exercise of its power of
judicial review, can adjudicate upon the validity of the action of the Speaker if
126
PART E
78 This Court has on several occasions restricted the scope of the bar
provided under Article 122 (and under corresponding Article 212 for the
brought home that distinction in the context of Article 212(1) with the following
observations:
Constitution Bench of this Court extended the above formulation to Article 122
of the Constitution:
127
PART E
Speaker, Lok Sabha114 (“Raja Ram Pal”). The Bench held that courts are
not prohibited from exercising their power of judicial review to examine any
128
PART E
The principle which emerges from these decisions is that the decision of the
79 The Attorney General advanced the submission that this Court has on
amending the Indian Coinage Act. Under the new system, while one rupee
129
PART E
was divided into a hundred naya paisas, the old legal tender of sixteen annas
or sixty four pice remained legal tender equivalent to one hundred naya
paisas. The appellant, which was a firm registered under the Mysore Sales
Tax Act, had to pay an additional amount as sales tax due to change in the
currency. It was argued that by the substitution of 2 naya paisas (the new
currency) in place of 3 pies (the old currency) as tax, there was a change in
the tax imposed by the Mysore Sales Tax Act, which could only have been
done by passing a Money Bill under Articles 198, 199 and 207 of the
Constitution and since no Money Bill was introduced or passed for the
enhancement of the tax, the tax was illegal and invalid. The contention,
therefore, was that the procedure envisaged for passing a Money Bill ought to
have been, but was not, followed. The Constitution Bench dismissed the
appeal, holding that the substitution of a new coinage i.e. naya paisas in place
of annas, pice and pies did not amount to an enhancement of tax. It was held
Court held that the levy of tax in terms of naya paisas was not unconstitutional
nor was it a taxing measure but it dealt merely with the conversion of the old
coinage into new coinage. Having held this, the Bench also remarked:
130
PART E
The Court having found that a substitution of coinage did not result in an
enhancement of tax, Article 199 was not attracted. The legislative measure
was not a Money Bill. Once that was the case, the subsequent observations
measure, it would be saved by Article 255. The court having held that no
alternative hypothesis is not a part of the ratio and was unnecessary. The ratio
was that substitution of a new coinage did not amount to a Money Bill. The
The Bench held that substitution of coinage did not make it a Money Bill. The
to the general remarks made in Mangalore Beedi as unnecessary and not the
ratio since the issue was already decided on merits, by holding that the
2012. Section 5(1) of the unamended Act provided a term of six years for the
Lokayukta. Section 5(3) provided that on ceasing to hold office, the Lokayukta
119 Pratik Datta, Shefali Malhotra & Shivangi Tyagi, Judicial Review and Money Bills, Vol 10, NUJS Law Review
(2017).
120 (2014) 11 SCC 415
131
PART E
government, which came in office, introduced a Bill which was passed as the
which the term of the U.P. Lokayukta and Up-Lokayukta was extended from
six years to eight years or till the successor enters upon office. The
The Amendment Act was challenged on the ground that it was passed as a
Money Bill when, on the face of it, it could never have been called a Money
Bill under Article 199 of the Constitution. The Bench rejected the petition
holding that the question “whether a Bill is a Money Bill or not can be raised
only in the State Legislative Assembly by a member thereof when the Bill is
pending in the State Legislature and before it becomes an Act”. It relied upon
132
PART E
The judgment also made a reference to the seven judge Bench decision in
upon Articles 212 and 255, the Bench accorded finality to the decision of the
Speaker:
Ram Pal, the Bench opined that even if it is established that there was some
validity of the Orissa Special Courts Act, 2006. The law was enacted by the
133
PART E
or hold high political and public offices. The legislature provided special courts
properties. The appellants, who were public servants and facing criminal
cases, challenged the Act on the ground that it was introduced in the State
Money Bill under Article 199 of the Constitution. The Court dismissed the
134
PART E
previous sanction will not invalidate the law, where the Act has received the
related to the decision or certificate of the Speaker of the Lok Sabha or of the
255 does not apply to Articles 110 for the simple reason that the latter does
not envisage superseding the role of the Upper House of Parliament or the
Yogendra Kumar. These two judgments cite the same three articles —
Articles 199,125 212,126 and 255, to refrain from questioning the conduct of the
Speaker, without noticing that Article 255 does not apply there.
Further, MSM Sharma, which was referred in Mohd Saeed Siddiqui was
125 Corresponding provision for the Union is Article 110 of the Constitution.
126 Corresponding provision for the Union is Article 122 of the Constitution.
135
PART E
suffer from illegality. The consistent thread which emerges from the judgments
in Special Reference, Ramdas Athawale and Raja Ram Pal is that the
Beedi. The decision of the Speaker under Articles 110(3) and 199(3) is not
The three judge Bench decision in Mohd Saeed Siddiqui and the two judge
where the Bill does not, objectively speaking, deal only with the provisions set
out in Article 110(1). The decision of the Speaker of the Lok Sabha whether a
Bill is a Money Bill impacts directly upon the constitutional role which will be
discharged by the Rajya Sabha in relation to it. The Lok Sabha alone does not
envisages a special role for the Rajya Sabha. In order to truly understand the
136
PART E
government have adopted bicameral legislatures, the United States being the
Where second chambers exist, they vary in terms of powers and composition.
Together, their powers and composition shape the impact that they have on
historic origins. It was first established in England, and later in the US.128 Both
was initiated when King John in 1215 gave a written commitment to seek the
prerogative. Over the next five centuries, the British Parliament was
the wishes of the ruler.129 In the fourteenth century, Parliament was divided
into two chambers: one chamber (the House of Lords) in which debate took
place with the feudal lords and a second chamber (the House of Commons)
Economic Performance (Elhanan Helpman ed.), Harvard University Press (2008), at pages 251-252
137
PART E
where the citizens were represented.130 The upper chamber of the British
with the discretion of the King to create them). The lower chamber, the
Before the beginning of the eighteenth century, several factors such as civil
war, regicide, experimentation with a republic, and the restoration of the titular
Parliament.131
Around the same time, the British colonies in North America were crafting
similar lines, with some exceptions, to British Parliament. The Constitution for
arrangement that replaced a class basis (as was in existence in Britain) for
and an upper chamber, a Senate, to which each state could send two
130 Betty Drexhage, Bicameral Legislatures: An International Comparison, Ministry of the Interior and Kingdom
Relations- Netherlands (2015), at page 7
131 Abhinay Muthoo & Kenneth A. Shepsle, The Constitutional Choice of Bicameralism, in Institutions and
Economic Performance (Elhanan Helpman ed.), Harvard University Press (2008), at page 252
132 Betty Drexhage, Bicameral Legislatures: An International Comparison, Ministry of the Interior and Kingdom
Relations- Netherlands (2015), at page 8
138
PART E
irrespective of their population size, would have an equal voice, and those
who wanted a Parliament for the newly formed federal nation where the
chosen to be the only way out of the deadlock.133 The rationale for a
indirectly elected Upper House was best articulated by James Madison, in the
Federalist Papers:
133Betty Drexhage, Bicameral Legislatures: An International Comparison, Ministry of the Interior and Kingdom
Relations- Netherlands (2015), at page 7
139
PART E
Madison conceptualized that the second chamber would fulfil significant roles:
(a) it would provide the certainty that the government will not neglect its
(b) it can curb the actions of the other chamber if it gives into the urge to
follow ‘sudden and pronounced sentimental reactions’; (c) it can meet the
need for expertise in the framing of laws and the interests of the country, and
thus help to avoid legislative mistakes; and (d) it can be a factor for stability
with the changing conceptions of the state. The literature on bicameralism has
thought:
134 James Madison, The Federalist No. 62 – The Senate, The Federalist Papers (1788), available at
http://www.constitution.org/fed/federa62.html
135 William H. Riker, The Justification of Bicameralism, International Political Science Review (1992), Vol. 13,
140
PART E
137 Betty Drexhage, Bicameral Legislatures: An International Comparison, Ministry of the Interior and Kingdom
Relations- Netherlands (2015).
138 Ibid, at pages 11-12
141
PART E
support find it difficult to pass Bills.139 Elliot Bulmer notes pertinently that in a
generates legislative advantage only “if the chambers differ significantly from
139 James N. Druckman & Michael F. Thies, The Importance of Concurrence: The Impact of Bicameralism on
Government Formation and Duration, American Journal of Political Science (2002), Vol. 46, No. 4, at pages
760-771.
140 Elliot Bulmer, Bicameralism, International Institute for Democracy and Electoral Assistance (2017), at page 4
141 James R. Rogers, The Advantage of Second Chambers in Republican Legislatures: An Informational Theory,
142
PART E
parliament can hold the government accountable and can check or restrain
the misuse of government power. Among its other roles is that of representing
minorities.
of several other nations. The constitutional advisor, B N Rau, found the issue
The first bicameral legislature as the national assembly for India was
Act, 1935 had created an Upper House in the federal legislature which
representatives sent by numerous princely states that were not under the
direct control of the British government. The 1935 Act became the blueprint
for the structure of Parliament in the new Constitution. The Rajya Sabha, as
the Upper House of the Parliament, was adopted into the Constitution. The
Austin:
143Granville Austin, The Indian Constitution: Cornerstone of a Nation, Oxford University Press (1966), at page
195
143
PART E
Sabha. The maximum strength of this chamber is 250 members, out of which
up to 238 members are elected representatives from the states and union
social service. Members representing the states are elected by the state
the American model of equal representation for the states, the allocation of
seats in the Rajya Sabha to the States and Union territories is in accordance
with the division provided in the Fourth Schedule of the Constitution (read with
Articles 4(1) and 80(2)). The reason behind this division of seats is “to
safeguard the interests of the smaller states while at the same time ensuring
the adequate representation of the larger states, so that the will of the
144 Granville Austin, The Indian Constitution: Cornerstone of a Nation, Oxford University Press (1966), at pages
180 & 203
145 Article 80(4), The Constitution of India
146 Article 80(5), The Constitution of India
144
PART E
those who represented the majority”147. In this sense, the Rajya Sabha has a
special structure.
reflect the pluralism of the nation and its diversity of language, culture,
perception and interest. The Rajya Sabha was envisaged by the makers of
working of the Lower Chamber in many ways. The Rajya Sabha acts as an
institution of balance in relation to the Lok Sabha and represents the federal
structure148 of India. Both the existence and the role of the Rajya Sabha
justifies its federal importance.149 Seervai has observed that the federal
147 Sidharth Chauhan, Bicameralism: comparative insights and lessons, Seminar (February, 2013) available at
http://india-seminar.com/2013/642/642_sidharth_chauhan.html
148 In SR Bommai v Union of India (AIR 1994 SC 1998), a seven-judge Bench of this Court held: “Democracy and
federalism are the essential features of our Constitution and are part of its basic structure.”
149 Rajya Sabha Secretariat, Second Chamber In Indian Parliament: Role and Status of Rajya Sabha, (2009), at
page 2. See also M.N. Kaul and S.L. Shakdher, Practice and Procedure of Parliament, Lok Sabha Secretariat
(2001)
145
PART E
integral element:
legitimately holds itself as the guardian of the interest of the component states
150 H M Seervai, Constitutional Law of India, Universal Law Co. Pvt. Ltd, Vol. 1, (1991), at pages 299-300.
146
PART E
Parliament, the Rajya Sabha enjoys some special powers, which are not even
151 Rajya Sabha Secretariat, Second Chamber In Indian Parliament: Role and Status of Rajya Sabha, (2009), at
page 6.
152 Rajya Sabha Secretariat, Structure and Functions of Rajya Sabha Secretariat, (2009), at pages 2-3
153 Under Article 83(1), the Rajya Sabha is a permanent body with members being elected for 6 year terms and
147
PART E
Constitution, even if it is against the popular will. The Rajya Sabha is a symbol
against majoritarianism.
by the Rajya Sabha in the Bills passed by the Lok Sabha were eventually
joint sitting158 of the two Houses and in that sitting, one of the amendments
154 Rajya Sabha Secretariat, Second Chamber In Indian Parliament: Role and Status of Rajya Sabha, (2009), at
pages 7-8
155 (2006) 7 SCC 1
156 Ibid, at page 47
157 Rajya Sabha Secretariat, Second Chamber In Indian Parliament: Role and Status of Rajya Sabha, (2009), at
page 5
158 Dr Ambedkar explained that the joint sitting had been kept at the centre because of the federal character of
the Central Legislature. See Granville Austin, The Indian Constitution: Cornerstone of a Nation, Oxford
University Press (1966), at page 202
148
PART E
suggested by the Rajya Sabha was adopted without a division. 159 The Rajya
Sabha has a vital responsibility in nation building, as the dialogue between the
on the role of the Rajya Sabha and, therefore, on the working of the federal
polity.
expectation that the Speaker of the Lok Sabha will not dilute the existence of
been vested in the office of the Speaker of the Lok Sabha. By declaring an
ordinary Bill to be a Money Bill, the Speaker limits the role of the Rajya
only limit the role of the Rajya Sabha, but denude the efficacy of a legislative
159 Rajya Sabha Secretariat, Second Chamber In Indian Parliament: Role and Status of Rajya Sabha, (2009), at
page 5
149
PART E
ensure that the federal features of the Constitution are not transgressed.
This Court must now deal with whether the Aadhaar Act was validly passed as
a Money Bill.
Money Bill, it must contain “only provisions” dealing with every or any one of
the matters set out in sub-clauses (a) to (g) of clause 1 of Article 110. The
expression “if it contains only provisions dealing with all or any of the following
and it is only upon the condition being fulfilled that the deeming fiction of a Bill
being a Money Bill for the purposes of the Chapter will arise. Secondly, to be a
Money Bill, the Bill should have only those provisions which are referable to
clauses (a) to (g). The condition is much more stringent than stipulating that
the Bill should incorporate any of the matters spelt out in clauses (a) to (g).
The words “only provisions” means that besides the matters in sub clauses (a)
to (g), the Bill shall not include anything else. Otherwise, the expression “only”
redundant. Thirdly, the two expressions “if it contains only provisions” and
“namely” indicate that sub-clauses (a) to (g) are exhaustive of what a Money
Bill may contain. The contents of a Money Bill have to be confined to all or any
150
PART E
residuary entry which covers all other matters other than those specified in
matter which is already specified in sub-clauses (a) to (f). The test is not
General would request the court to read the word “only” before “if” and not
dealing with clause (a) to (g), even if it contained other provisions not relatable
Clause (2) of Article 110 provides that a Bill shall not be deemed to be a
Money Bill just for the reason that it provides for the imposition of fines or
other pecuniary penalties, or for the demand or payment of fees for licences or
fees for services rendered, or by reason that it provides for the imposition,
body for local purposes. Like in the Parliament Act of 1911, the definition of a
151
PART E
Money Bill provided under Article 110(1) is exhaustive in nature. A Bill can be
a Money Bill if it contains “only provisions” dealing with all or any of the
96 A Financial Bill is different from a Money Bill. Article 117 provides for
special provisions relating to Financial Bills. Clause (1) of Article 117 states:
A Financial Bill does not need to have “only provisions” dealing with Sub-
clauses (a) to (f) of Article 110. The provisions of Article 110(1) are therefore
outside its scope. This Court has interpreted the expression “only” as a word
160Hari Ram v. Baby Gokul Prasad, (1991) Supp (2) SCC 608; M/s Saru Smelting (P) Ltd. v. Commissioner of
Sales Tax, Lucknow, (1993) Supp (3) SCC 97.
152
PART E
to delete the word “only”. He stated that a Bill can be a Money bill even while
word “only”. The concern of these two members was that the word “only”
restricts the scope of a Bill being passed as a Money Bill. Their apprehension
was that if a Bill has other provisions which are unrelated to the clauses
mentioned in draft Article 90, the Bill would not qualify to be a Money Bill in
view of the word “only”. The amendment suggested by these members was
listed to be put to vote on a later date. The amendment was rejected when it
was put to vote on 8 June 1949. The framers of the Indian Constitution
153
PART E
98 When a Bill is listed as a Money Bill, it takes away the power of the
Rajya Sabha to reject or amend the Bill. The Rajya Sabha can only make
suggestions to a Money Bill, which are not binding on the Lok Sabha. The
Constitution makers would have been aware about the repercussions of a Bill
being introduced as a Money Bill. As the role of the Rajya Sabha is limited in
the context of Money Bills, the scope of what constitutes a Money Bill was
restricted by adopting the word “only” in Draft Article 90. A Bill to be a Money
Bill must not contain any provision which falls outside clauses (a) to (g) of
Article 110(1). The Constitution has carefully used the expression “dealing
with” in Article 110 (1) and not the wider legislative form “related to”. A Bill,
which has both − certain provisions which fall within sub-clauses (a) to (g) of
Article 110(1) and other provisions which fall outside will not qualify to be a
Money Bill. It is for this reason that there cannot also be any issue of the
sub-clauses (a) to (g) of Article 110(1), while also containing provisions which
fall beyond. Any other interpretation would result in rewriting the Constitution.
If a Bill contains provisions which fall outside sub-clauses (a) to (g), it is not a
Money Bill. The Rajya Sabha is entitled as part of its constitutional function to
Bill, once it contains any matters which fall beyond sub-clauses (a) to (g).
Once that is the position, it could be impossible to sever those parts which fall
within sub-clauses (a) to (g) and those that lie outside. The presence of
matters which travel beyond sub-clauses (a) to (g) has consequences in terms
154
PART E
of the nature of the Bill and the legislative participation of the Rajya Sabha. If
the constitutional function of the Rajya Sabha has been denuded on the
hypothesis that this Bill was a Money Bill, the consequence of a finding in
judicial review that the Bill is not a Money Bill must follow. Any other
held that the ordinance making power conferred upon the President and the
Governors is limited by the requirements set out by Articles 123 and 213. This
99 The authority of the Lok Sabha to pass a Money Bill is based on the
requirements set out under Article 110. The framers of the Indian Constitution
155
PART E
deliberately restricted the scope of Article 110(1) to ensure that the provision
is not an avenue to supersede the authority of the Rajya Sabha. The intention
of the Constitution makers is clear. The Lok Sabha cannot introduce and pass
a legislative measure in the garb of a Money Bill, which could otherwise have
Introduction and passing of a Bill as a Money Bill, which does not qualify to be
unconstitutional. The Lok Sabha is not entrusted with the entire authority of
Parliament. The Lok Sabha, the Rajya Sabha and the President together
political party or a coalition which holds the majority in the Lok Sabha cannot
written with the vision of those who gave blood and sweat to freedom: political
institutions, justice and good governance. That vision cannot be belied. The
164 Constituent Assembly Debates (4 November, 1948). Dr Ambedkar had remarked: “… it is perfectly possible to
pervert the Constitution, without changing its form by merely changing the form of the administration and to
make it inconsistent and opposed to the spirit of the Constitution.”
156
PART E
Speaker of the Lok Sabha has an onerous constitutional duty to ensure that a
Bill, which is not a Money Bill is not passed as a Money Bill. The Speaker of
the Lok Sabha, the Chairman of the Rajya Sabha, the members of the Lok
Sabha and the Rajya Sabha, and the President need to work in constitutional
101 The Aadhaar Act was passed as a Money Bill. The provisions of the Act
The Preamble focuses on the delivery of subsidies, benefits and services for
which the expenditure is borne from the Consolidated Fund of India. But the
essential issue is whether the Act confines itself to matters which fall within
165 Section 2(v) provides: “resident” means an individual who has resided in India for a period or periods
amounting in all to one hundred and eighty-two days or more in the twelve months immediately preceding
the date of application for enrolment.
157
PART E
the Unique Identification Authority of India (UIDAI) would verify the information
provides that the Aadhaar number may be accepted as proof of identity for
who do not have any permanent dwelling house and such other categories of
condition to avail subsidies, benefits and services, for which the expenditure is
borne from the Consolidated Fund of India. The proviso to Section 7 states
158
PART E
used for submission to the CIDR for authentication. Section 8(3) requires a
104 Chapter IV of the Act deals with UIDAI. Section 11 establishes UIDAI as
the body responsible for the processes of enrolment and authentication and
for performing functions assigned to it under the Act. The Act provides for the
its chairperson and members, their removal173 and functions174. Section 23,
which deals with the powers and functions of UIDAI, authorizes it to develop
the policy, procedure and systems for issuing Aadhaar numbers to individuals
168 Section 2(c) provides: “authentication” means the process by which the Aadhaar number alongwith
demographic information or biometric information of an individual is submitted to the Central Identities Data
Repository for its verification and such Repository verifies the correctness, or the lack thereof, on the basis of
information available with it.
169 Section 2 (u) provides: “requesting entity” means an agency or person that submits the Aadhaar number, and
demographic information or biometric information, of an individual to the Central Identities Data Repository for
authentication
170 Section 12, Aadhaar Act
171 Section 13, Aadhaar Act
172 Section 14, Aadhaar Act
173 Section 15, Aadhaar Act
174 Section 17, Aadhaar Act
159
PART E
and to perform authentication. Section 23(h) states that UIDAI has the power
purposes” for which Aadhaar numbers may be used. Under Section 23(3),
105 Chapter V deals with grants, accounts and audit and annual reports of
UIDAI. Section 25 provides that the fees or revenue collected by UIDAI shall
requires UIDAI to take all necessary measures to ensure that the information
secured and protected against access, use or disclosure (not permitted under
information, collected or created under the Act. Section 32(2) entitles every
160
PART E
106 Chapter VII of the Act (Sections 34 to 47) provides for offences and
Section 37, a penalty for disclosing identity information (which was collected in
penalty for unauthorised access to the CIDR. Section 39 imposes a penalty for
tampering with data in the CIDR. Under Sections 40 and 41, a penalty has
been provided for requesting entities and enrolment agencies, in case they act
in contravention of the obligations imposed upon them under the Act. Section
44 indicates that the provisions of the Act would apply to any offence or
nationality.
the UIDAI to delegate to any member, officer of the Authority or any other
person, such of its powers and functions (except the power under section 54)
make rules to carry out the provisions of the Act. Under Section 54(2)(m),
UIDAI can make regulations providing the manner of use of Aadhaar numbers
161
PART E
services and “other purposes” for which Aadhaar numbers may be used.
Aadhaar number for establishing the identity of an individual “for any purpose”,
the Act. Section 59 seeks to validate the actions taken by the Central
This broad description of the provisions of the Aadhaar Act indicates that the
Act creates a framework for obtaining a unique identity number - the Aadhaar
that the Aadhaar number may be accepted as proof of identity for any
purpose. The Act, in other words, creates a platform for one pan-India and
deal with the process of enrolment. Section 3 entitles every resident to hold
generated may be used as a proof of identity “for any purpose”. The primary
object of the legislation is to create one national identity for every resident. It
fulfilment of its provisions. In its primary focus and initiatives, the law traverses
162
PART E
beyond the territory reserved by Article 110 for a Money Bill. Sections 7 to 10
that the identity information of such individual is only used for submission to
including developing the policy, procedure and systems for issuing Aadhaar
various subsidies, benefits, and services, Aadhaar numbers may be used for
order (not below the rank of District Judge) or in the interest of national
offences and penalties created under the Act. Sections 54(2)(m) states that
163
PART E
benefits, services and “other purposes” for which Aadhaar numbers may be
by the State or any body corporate or person under law or contract) for
108 Section 7 makes the use of the Aadhaar number mandatory for availing
Consolidated Fund of India. The scheme of the Act deals with several aspects
relating to the unique identity number. The unique identity is capable of being
used for multiple purposes: availing benefits, subsidies and services, for
which expenses are incurred from the Consolidated Fund of India, is just one
purpose, among others. The Preamble to the Aadhaar Act indicates that the
benefits and services, the expenditure for which is incurred from the
however, not confined to the object specified in the Preamble. Indeed, they
travel far beyond the boundaries of a money bill under Article 110(1). The
164
PART E
penalties for disclosure or loss of information, and the use of the Aadhaar
number for any purpose lie outside the ambit of Article 110. These themes are
also not incidental to any of the matters covered by sub-clauses (a) to (f) of
Article 110(1). The provisions of Section 57 which allow the use of an Aadhaar
number by bodies corporate or private parties for any purpose do not fall
within the ambit of Article 110. The legal framework of the Aadhaar Act
109 A Bill, to be a Money Bill, must contain only provisions which fall within
the ambit of the matters mentioned in Article 110. Section 7 of the Act allows
and subsidies for which expenditure is incurred from the Consolidated Fund of
India. Under clause (e) of Article 110(1) the money bill must deal with the
provides that in the case of services, benefits or subsidies which are already
165
PART E
Consolidated Fund of India. Hence, even Section 7 is not within the ambit of
Article 110, that does not apply to the other provisions of the Act. The other
provisions of the Act do not in any event fall within the ambit of Article 110(1).
Introducing one provision – Section 7 – does not render the entirety of the Act
a Money Bill where its other provisions travel beyond the parameters set out in
Article 110. Section 57 of the Act in particular (which creates a platform for the
use of the Aadhaar number by the private entities) can by no stretch of logic
be covered under Article 110(1). The other provisions of the Act do not deal
with that which has been provided under Sub-clauses (a) to (g) of Article 110.
the Aadhaar Act are not “incidental to any of the matters specified in sub-
clauses (a) to (f)”. Even if it is assumed that there is one provision (Section 7)
110 This Court must also advert to the legislative history prior to the
governing the Aadhaar project was first made by introducing the National
Identification Authority of India Bill, 2010 (“NIA Bill”). The NIA Bill was
166
PART E
introduced in the Rajya Sabha on 3 December 2010. The Preamble of the Bill
The main objective of the Bill was to establish the National Identification
residents of India and to any other category of people for the purpose of
Bill dealt with Aadhaar numbers. Clause 3 of the Bill entitled every resident to
23) dealt with the National Identification Authority of India. Clause 11 provided
empowered the Authority to develop the policy, procedure and systems for
23(2)(h) stated that the Authority may specify the usage and applicability of
167
PART E
Chapter IV (Clauses 24 to 27) provide for grants, accounts and audit and
annual reports related to the Authority. Clause 25 stated that the fees or
of India and the entire amount would be transferred to the Authority. Chapter
ascertaining the extent and pattern of usage of Aadhaar numbers across the
and authentication records. Clause 30(1) required the Authority to ensure the
Member, officer of the Authority or any other person such of its powers and
functions (except the power under Clause 53). Clause 57 sought to validate
168
PART E
notification of 2009.
111 Since the UID programme involved complex issues, the NIA Bill was
from the Rajya Sabha. The Standing Committee submitted its Report175 on 11
December 2011. The Report raised several objections to the Bill, which
(i) Since law making was underway, the bill being pending, any executive
(ii) While the country is facing a serious problem of illegal immigrants and
notified from time to time. This will, it is apprehended, make even illegal
169
PART E
Scheme is riddled with serious lacunae and concern areas. For example,
the full or near full coverage of marginalized sections for issuing Aadhaar
numbers could not be achieved mainly due to two reasons viz. (a) the
UIDAI doesn’t have the statistical data relating to them; and (b) estimated
(v) The UID scheme lacks clarity on many issues including even the basic
an Aadhaar number;
not ensure that beneficiaries have been correctly identified. Thus, the
170
PART E
(vii) Though there are significant differences between the identity system of
other countries and the UID scheme, yet there are lessons from the
completely;
law that deals with large scale collection of information from individuals
which the UID scheme was approved. Unlike many other schemes /
done before approving such an expensive scheme, was done involving all
(x) The UID scheme may end up being dependent on private agencies,
171
PART E
residents get enrolled into the system may have far reaching
With these apprehensions about the UID scheme, the Standing Committee on
India Bill, 2010 was not acceptable. The Committee urged the Government to
172
PART E
reconsider and review the UID scheme and the proposals contained in the Bill
and bring forth a fresh legislation before Parliament. Ultimately, the NIA Bill
112 A comparison of the Aadhaar Act 2016 and NIA Bill 2010 reveals that
statutory authority. The NIA Bill was not a Money Bill. It was never passed by
Finance, which had 10 members from the Rajya Sabha and 21 from the Lok
Sabha. The NIA Bill did not contain a provision, similar to Section 7 of the
Aadhaar Act. Yet, as discussed earlier, the presence of Section 7 does not
make the Aadhaar Act a Money Bill. Introducing the Aadhaar Act as a Money
Bill deprived the Rajya Sabha of its power to reject or amend the Bill. Since
the Aadhaar Act in its current form was introduced as a Money Bill in the Lok
(which also included deletion of Section 57) were rejected by the Lok Sabha.
The legislative history is a clear pointer to the fact that the subsequent
the Rajya Sabha. The Rajya Sabha was deprived of its legitimate
constitutional role by the passage of the Bill as a Money Bill in the Lok Sabha.
173
PART E
113 The Court must also address the contention of the Respondents that
the Aadhaar Act is “in pith and substance” a Money Bill. The learned Attorney
General for India has submitted that though the Act has ancillary provisions,
its main objective is the delivery of subsidies, benefits and services flowing out
of the Consolidated Fund of India and that the other provisions are related to
the main purpose of the Act which was giving subsidies and benefits. It has
been submitted that the real test to be applied in the present dispute is the
114 This Court has applied the doctrine of pith and substance when the
within an entry in one of the three Lists in the Seventh Schedule over which
the legislature has competence under Article 246 of the Constitution. The
the Union and the States. When a law enacted by a legislature is challenged
substance is invoked. Under the doctrine, the law will be valid if in substance,
174
PART E
Bharat Shanti Lal Shah177 has summarized the process of reasoning which
must be followed by the Court while applying the doctrine of pith and
175
PART E
115 The doctrine of pith and substance is mainly used to examine whether
the legislature has the competence to enact a law with regard to any of the
a Money Bill, a Bill which travels beyond the constitutional boundaries set out
by Article 110 Whether a Bill is validly passed as a Money Bill has nothing to
do with the legislative competence of the legislature under Article 246 of the
boundaries of Article 110. The submission of the Attorney General boils down
to this: ‘ignore the expression “only provisions dealing with all or any of the
following matters” and hold the Bill to be a Money Bill by treating Section 7 as
its dominant provision’. This cannot be accepted. This would ignore the
the submission of the Attorney General requires the court to transpose the
word “only” from its present position to a place before “if”. That would be to
contained some provisions which fall under sub-clauses (a) to (g). The
176
PART E
provisions” dealing with one or more of the matters set out in sub-clauses (a)
to (g). Looked at in another way, all the provisions of the Aadhaar Act (apart
Article 110. Section 7 does not deal with the declaring of any expenditure as
does not charge any expenditure to the Consolidated Fund. It deals with
In support of their contention, the Respondents have also relied upon a two
Teachers’ College179 to submit that the doctrine of pith and substance can be
177
PART E
case of conflict between entries in List I and List II, the same
has to be decided by application of the principle of "pith and
substance". The doctrine of "pith and substance" means
that if an enactment substantially falls within the powers
expressly conferred by the Constitution upon the
legislature which enacted it, it cannot be held to be
invalid, merely because it incidentally encroaches on
matters assigned to another legislature. When a law is
impugned as being ultra-vires of the legislative competence,
what is required to be ascertained is the true character of the
legislation. If on such an examination it is found that the
legislation is in substance one on a matter assigned to the
legislature then it must be held to be valid in its entirety even
though it might incidentally trench on matters which are
beyond its competence. In order to examine the true
character of the enactment, the entire Act, its object and
scope and effect, is required to be gone into. The question of
invasion into the territory of another legislation is to be
determined not by degree but by substance. The doctrine of
"pith and substance' has to be applied not only in cases
of conflict between the powers of two legislatures but in
any case where the question arises whether a legislation
is covered by particular legislative power in exercise of
which it is purported to be made.”180 (Emphasis supplied)
observations made by the Court are in relation to the power to legislate under
Bill. Therefore, the argument that the Aadhaar Act is “in pith and substance” a
116 Introducing the Aadhaar Act as a Money Bill has bypassed the
constitutional authority of the Rajya Sabha. The passage of the Aadhaar Act
Sabha from altering the provisions of the Bill by carrying out amendments. On
the touchstone of the provisions of Article 110, the Bill could not have been
180 Ibid, at pages 233-234
178
PART E
117 The Rajya Sabha has an important role in the making of laws.
it does not qualify for it, damages the delicate balance of bicameralism which
is a part of the basic structure of the Constitution. The ruling party in power
may not command a majority in the Rajya Sabha. But the legislative role of
to pass. Institutions are crucial to democracy. Debasing them can only cause
179
PART F
The Act thus fails to qualify as a Money Bill under Article 110 of the
Constitution. Since the Act was passed as a Money Bill, even though it does
not qualify to be so, the passage of the Act is an illegality. The Aadhaar Act is
unconstitutional.
118 The term ‘biometric’ is derived from the Greek nouns ‘βίος’ (life) and
person are collected, measured and stored for the automated verification of a
claim made by that person for the identification of that person.”184 These
systems thus identify or verify the identity or a claim of persons on the basis of
voice).
182 Gary Roethenbaugh, (cited in A. Cavoukian, Privacy and Biometrics, Information and Privacy Commissioner,
Ontario, Canada, 1999, page 11, available at http://www.ipc.on.ca/images/Resources/pri- biom.pdf
183 Els J. Kindt, Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis,
Springer (2013)
184 Ibid.
180
PART F
119 The idea that parts of our body can be used to identify our unique
selves is not new. Prints of hand, foot and finger have been used since
manual way. Today’s biometric systems hence differ from manual verification
related to facial features, iris, voice, hand geometry and DNA. Each trait is
collected using different technologies and can be used for different purposes
185 Ibid.
186 Ibid.
181
PART F
system to verify his/her identity for any purpose, the information is used by
matching the ‘electronic digital template’ saved with the biometric information
This system compares a source of biometric data with existing data for that
specific person.
120 There had been an initial increase in the usage of biometric technology
in both developed and developing countries by both the private and the public
developed countries in the 1980s and 1990s, recent trends depict their
187Nancy Yue Liu, Bio-Privacy: Privacy Regulations and the Challenge of Biometrics, Routledge (2013).
188Privacy International, Biometrics: Friend or foe of privacy?, available at
https://privacyinternational.org/sites/default/files/2017-11/Biometrics_Friend_or_foe.pdf
182
PART F
scrapping of the National Identity Register and ID cards in the UK, and
often these goals are prioritised at the expense of their right to privacy and
other human rights.190 Simon Davies, an eminent privacy expert, points out
aggressively tried out with welfare recipients since they are not in a position to
189 Ibid
190 Ibid
191 Simon Davies, as cited in John D. Woodward, Biometric Scanning, Law & Policy: Identifying the Concerns -
183
PART F
essential to the gathering of accurate data which is required for monitoring the
brings many advantages, the flip side is that the same technology can also
have shown that there exists a huge risk of mass human rights violations
where individuals are denied basic fundamental rights, and in extreme cases,
122 Technology today brings with it tremendous power and is much like two
194 Ibid
195 Privacy International, Biometrics, available at https://privacyinternational.org/topics/biometrics
196 Privacy International, Biometrics: Friend or foe of privacy?, available at
https://privacyinternational.org/sites/default/files/2017-11/Biometrics_Friend_or_foe.pdf
184
PART F
flip side is the concern over the abuse of new technology, including
and large-scale profiling. This is particularly acute, given the fact that
and data protection are often missing. The lack of regulatory frameworks, or
and poses a constant risk that the concepts of privacy, liberty and other
national constitutions and numerous global and regional human rights treaties.
In today’s digital age, the right to privacy is “the cornerstone that safeguards
who we are and supports our on-going struggle to maintain our autonomy and
sense that it uses part of the human body or behaviour as the basis of
185
PART F
issues that arise when government agencies or private firms collect any
personal information about citizens, there are specific features that distinguish
biometric data from other personal data, making concerns about biometric
125 There are two main groups of privacy- related interests that are directly
information about oneself is closely related to the dignity of the individual, self-
respect and sense of personhood. The second interest group falls under the
many jurisdictions, the basis of informational privacy is the notion that all
200 Ibid
201 Ibid
186
PART F
infringement of the data subject’s personal space. Iris and fingerprint scanners
require close proximity of biometric sensors to body parts such as eyes, hands
and fingertips.
Even in the context of law enforcement and forensic identification, the use of
have laws and regulations which are intended to regulate such measures, in
traces related to a crime but are instead conducted for the purpose of
generally accepted legal doctrine that a person is innocent until proven guilty
to concerns about informational privacy. The reason for this is that physical
intrusion resulting from the use of biometric technology usually results from
187
PART F
and autonomy. Anonymity may turn out to be the only tool available for
Given the manner in which personal information can be linked and identified
While some argue that “it is not obvious that more anonymity will be lost when
biometrics are used”, this argument may have to be evaluated in light of the
fact that there is no existing identifier that can be readily equated with
universal, long-lasting and intimately linked as biometrics. To say that the use
of biometrics will not cause further loss of anonymity may thus be overly
202 Nancy Yue Liu, Bio-Privacy: Privacy Regulations and the Challenge of Biometrics, Routledge (2013).
203 Ibid
204 Ibid
188
PART F
demographic data such as address, age and gender, among other data, when
Biometrics are at the very heart of identification systems. There are numerous
of race, ethnicity and religion was facilitated through the use of identification
invasion of privacy. When the purpose of collecting the biometric data is just
189
PART F
potential fear is that there are situations where there are few or no benefits to
unnecessary to know who the person is, when all that is needed to be
that make us ‘humans’ and its broad scope brings together a variety of
data is to set strict legal standards to ensure that the intrusion into privacy is
commensurate with and proportional to the need for the collection of bio-
metric data.208
207 Nancy Yue Liu, Bio-Privacy: Privacy Regulations and the Challenge of Biometrics, Routledge (2013).
208 Ibid
190
PART F
and/or bodily tissues. If consent is required, rules are in place to regulate the
provided as to how and by whom the search will be performed. Therefore, the
(a) If required, what exactly should be the extent of coverage of the consent?
variety of errors inevitably occur. Mature technology is a popular term for any
Passwords and numbers can be changed, but how does one change the basic
theft?
191
PART F
All of these parameters need to be applied to test the validity of the Aadhaar
Government of India that guided the introduction and role of biometrics before
the enactment of the Aadhaar Act will be analysed, which will be followed by
technology and privacy, as they are enshrined in the Aadhaar Act, 2016 and
July 2006, to suggest the processes for updation, modification, addition and
deletion of data from the core database to be created under the Unique ID
210 Ministry of Communication & Information Technology, Department of Information Technology, Administrative
Approval for the project - “Unique ID for BPL families”, dated March 03, 2006 (Annexure R-1, List of Pre-
enactment dates and events for the Aadhaar project submitted by the Learned AG).
211 Department of Information Technology, Notification: Setting up of a Process Committee to suggest the
processes for updation, modification, addition & deletion of data and fields from the core database to be
created under the Unique ID for BPL families project, dated July 03, 2006 (Annexure R-2, List of Pre-
enactment dates and events for the Aadhaar project submitted by the learned AG).
192
PART F
recommended the linkage of the UID database with other databases which
would ensure continuous updation and user-based validation and use of the
inter-alia, also stated that statutory backing would be required for adoption of
UID in the long term;214 focus and conviction would be required on security
‘transparency vs. right to privacy’ was another challenge that would have to be
stage.
(“EGoM”), was constituted with the approval of the Prime Minister to collate
the National Population Register (“NPR”) under the Citizenship Act 1955 and
2007, the Processes Committee decided that the UID database would evolve
in three stages: initial, intermediate and final. Biometrics was mentioned for
the first time in the context of UID, when the committee agreed that if the
212 Strategic Vision: Unique Identification of Residents, dated 26 November 2006 (Annexure R-3, List of Pre-
enactment dates and events for the Aadhaar project submitted by the learned AG).
213 Ibid
214 Ibid
215 Ibid
216 Ibid
217 Constitution of an Empowered Group of Ministers to collate two schemes - the National Population Register
under the Citizenship Act, 1955 and the Unique Identification Number (UID) project of the Department of
Information Technology (Annexure R-4, List of Pre-enactment dates and events for the Aadhaar project
submitted by the learned AG).
193
PART F
Commission on 28 January 2008.219 while the strategy to collate NPR and UID
was also approved. The EGoM also agreed that the collection of data under
the extent feasible, while it was also resolved that the data collected under the
NPR would be handed over to the UID Authority for maintenance and
updation. The EGoM, in its fourth meeting dated 4 November 2008 decided
that initially, the UIDAI will be established as an executive body under the
create its database from the electoral roll of the ECI and verify it through
Below Poverty Line and Public Distribution System data, but it would also
have the authority to take its own decisions as to how a database should be
218 Planning Commission, No. 4(4)/56/2005- C&I, Minutes of the Fifth Meeting of the Unique ID project under the
Chairmanship of Dr. Arvind Virmani (Annexure R-6, List of Pre-enactment dates and events for the Aadhaar
project submitted by the learned AG).
219 Minutes of the Second Meeting of the EGoM to collate two schemes - The National Population Register under
the Citizenship Act, 1955 and the Unique Identification number (UID) project of the Department of Information
Technology (Annexure R-10, List of Pre-enactment dates and events for the Aadhaar project submitted by the
learned AG).
220 Minutes of the Fourth Meeting of the EGoM to collate two schemes - The National Population Register under
the Citizenship Act, 1955 and the Unique Identification Number (UID) project of the Department of Information
Technology (Annexure R-12, List of Pre-enactment dates and events for the Aadhaar project submitted by the
learned AG).
194
PART F
May 2009 enclosing a brief write up on UIDAI and UID numbers for resident
Indians. The letter included the concept, implementation strategy, model of the
project along with the role and responsibilities of the states/ UTs.221 It was also
decided that partner databases for two-way linkages between the UID
database and the partner databases for maintenance and continuous updation
rural household survey database and the State ration card (PDS) databases.
135 The first meeting of the PM’s Council of UIDAI, was held on 12 August
decided, among other things, that the proposal to designate UIDAI as an apex
systems and processes used by various agencies that use the UID system.
221 Secretary, Government of India, Planning Commission, D.O. No. A-11016/02/09-UIDAI (Annexure R-22, List
of Pre-enactment dates and events for the Aadhaar project submitted by the learned AG).
222 Planning Commission, Minutes of the meeting of the PM’s Council of UIDAI (Annexure R-35, List of Pre-
enactment dates and events for the Aadhaar project submitted by the Learned AG).
223 Planning Commission, UIDAI, Office Memorandum, available at
https://www.uidai.gov.in/images/resource/Biometric_Standards_Committee_Notification.pdf.
195
PART F
This was followed by the creation of the Demographic Data Standards and
following mandate:224
data and recommend the Demographic Data standards (The data fields
to ensure that the data captured, at the time of enrolment of the residents
136 The DDSVPC in its report dated 9 December 2009, stated that UIDAI
had selected biometrics features as the primary method to check for duplicate
196
PART F
verified properly so that the data within UID system can be used for
● Supporting documents;
introduce a resident and vouch for the validity of the resident’s information;
and (This idea was borrowed from the account opening procedure in the
banks.)
Register.
containing the resident’s name and photograph and the name and address,
respectively. On 9 April 2010, the collection of iris biometrics for the NPR
features, benefits, revenue model and timelines of the project.227 The survey
226 Annexure R-43, Volume II, List of Pre-enactment dates and events for the Aadhaar project, Submissions by
the AG
227 UIDAI, UIDAI Strategy Overview, available at
http://www.prsindia.org/uploads/media/UID/UIDAI%20STRATEGY%20OVERVIEW.pdf.
197
PART F
outlined that UIDAI would collect the following demographic and biometric
● Name
● Date of birth
● Gender
● Father's/ Husband's/ Guardian's name and UID number (optional for adult
residents)
● Mother's/ Wife's/ Guardian's name and UID number (optional for adult
residents)
● Introducer's name and UID number ( in case of lack of documents)
● Address
● All ten fingerprints, photograph and both iris scans
for the UID project was submitted to the Cabinet Committee on UIDAI. 228
Permission of the Union Cabinet was sought to ensure that the approach
for the NPR exercise and by all other Registrars in the UID system. The
rationale behind the inclusion of iris biometrics and the need for capturing iris
India Bill, 2010 (NIAI Bill) in the Rajya Sabha on 3 December 2010. On 13
February 2011, the one millionth Aadhaar card was delivered. Thereafter, on
228Annexure R-46, Volume II, List of Pre-enactment dates and events for the Aadhaar project, Submissions by
the AG
198
PART F
information) Rules, 2011 [“IT Rules”] under Section 43A of the IT Act, 2000.
139 BSC in its report dated 30 December 2009 stated that it held extensive
quality. Over 2,50,000 fingerprint images from 25,000 persons were sourced
from the districts of Delhi, UP, Bihar and Orissa. Nearly all the images were
from rural regions, and were collected by different agencies using different
capture devices, and through different operational processes. The BSC report
collected. This action of UIDAI raises privacy concerns especially since the
fingerprints were collected from rural regions where people may not have
199
PART F
to be at the core of UIDAI’s de-duplication efforts and that the ISO 19794
series of biometrics standards for fingerprints, face and iris set by the
International Standards Organization (ISO) were most suitable for the UID
shall be at the core of UIDAI’s de-duplication efforts, its accuracy in the Indian
140 In its report for discussion titled “Technical Standards for Digital Identity
229 UIDAI Committee on Biometrics, Biometrics Design Standards For UID Applications, at page 4
230 Ibid.
200
PART F
UIDAI had not implemented “an important security standard, ISO 24745,
noticed that the ISO 24745 standard was published in August 2011 whereas
the report of BSC had already been submitted to UIDAI in January 2010.
However, Mr. Myung Geun Chun, the Project Editor of ISO 24745, is reported
to have stated that ISO 24745 standard is an ‘invaluable tool’ for addressing
‘unique privacy concerns’ like ‘unlawful processing and use of data’ raised by
ISO 24745 seeks to “safeguard the security of a biometric system and the
specifies:
231 Identification for Development (World Bank Group), Technical Standards for Digital Identity Systems for Digital
Identity Draft for Discussion, available at http://pubdocs.worldbank.org/en/579151515518705630/ID4D-
Technical-Standards-for-Digital-Identity.pdf, at page 22.
232 Katie Bird, Is your biometric data safe online? ISO/IEC standard ensures security and privacy, (11 August
201
PART F
The report states that ‘agencies’ may store the information of the residents at
the time of enrolment, but they will not have access to the information stored
report stated that the additional information which was being sought from
people was only biometric information like fingerprints and iris scans, as other
information was already available with public and private agencies in the
putting necessary provisions “in place”.238 It was also observed in the context
security and passport records, risks financial and other assets and the
reputation of the resident.239 According to the review, the envisaged UIDAI Act
(which was still under contemplation at the time of publishing of this report and
had not yet been legislated) would have remedies for the following offences:
202
PART F
However, according to the report, UIDAI was to concern itself only with identity
resident.241
141 The following conclusions emerge from the UIDAI’s strategy overview:
Firstly, the UIDAI was aware of the importance of biometric information before
the Aadhaar programme had been rolled out. Secondly, UIDAI had itself
harms which could result after the identity theft of a person, more so when the
potential ‘UIDAI Act’ was still in the pipeline and was not eventually enacted
until 2016.
240 Ibid.
241 Ibid, at page 34
203
PART F
C. Registrars
142 The term ‘Registrar’ was first defined by UIDAI in its DDSVPC Report as
“any government or private agency that will partner with UIDAI in order to
enroll and authenticate residents”.242 In the Strategy Overview, the term was
defined as “agencies such as central and state departments and private sector
http://www.prsindia.org/uploads/media/UID/UIDAI%20STRATEGY%20OVERVIEW.pdf, at page 2
244 Ibid, at page 15
204
PART F
stated that “UIDAI has defined security guidelines for the storage of
storage were defined by UIDAI, it is evident that this took place only after 2010
before which the registrars were functioning without guidelines mandating how
The following guideline finds mention both in the Handbook of 2010 and 2013:
205
PART F
Registrars, to inform residents that their biometric data will be stored by them
and how the data was to be used and kept secure. In contrast, Regulation 5 of
144 What the Registrar is obliged to do under law after the enactment of the
the Aadhaar Act. Thus, it is uncertain whether residents were informed about
where and how their data would be kept secure since the guidelines to the
Enrollment’ is “Make sure that the resident is well informed that his/her
206
PART F
upon the enrolment staff.249 In the absence of informed consent for the
145 Section 3(2) of the Aadhaar Act requires enrolment agencies to inform
the individual being enrolled about: a) the manner in which information shall
does not offer any clarification or mechanism on how the mandate of Section
3(2) is to be fulfilled.
http://www.nictcsc.com/images/Aadhaar%20Project%20Training%20Module/English%20Training%20Module/
module2_aadhaar_enrolment_process17122012. pdf
207
PART F
However, all that Schedule I states is: “I have a right to access my identity
146 Section 2(I) of the Act, which defines an enrolling agency read with
clauses (f) and (w) of sub-section (2) of Section 54 of the Aadhaar Act deal
authentication data and records. Regulation 5 (1) states what details shall be
208
PART F
which are a) the nature of information that will be shared by the Authority upon
information. Regulation 6 (2) mandates that a requesting entity shall obtain the
obtained in the manner and form as may be specified by the Authority for this
purpose.
mandates that the requesting entity shall obtain the consent of the Aadhaar
the regulations specify the clearly defined options that should be made
available to the Aadhaar number holder in case they do not wish to submit
followed in case the Aadhaar number holder does not provide consent. This is
all identity systems, particularly those that are implemented on a large scale.
209
PART F
information”. The petitioners have argued that the wide ambit of this provision
mobile number, email address and any other demographic information that
with e-KYC data251 [which is defined in Regulation 2(k)] can be returned to the
250 Regulation 2(j) of Aadhaar (Authentication) Regulations: “e-KYC authentication facility” means a type of
authentication facility in which the biometric information and/or OTP and Aadhaar number securely submitted
with the consent of the Aadhaar number holder through a requesting entity, is matched against the data
available in the CIDR, and the Authority returns a digitally signed response containing e-KYC data along with
other technical details related to the authentication transaction.
251 Regulation 2(k) of Aadhaar Authentication Regulations: “e-KYC data” means demographic information and
two types of authentication facilities provided by the Authority, namely— (i) Yes/No authentication
facility, which may be carried out using any of the modes, (ii) e-KYC authentication facility, which may be
carried out only using OTP and/ or biometric authentication modes as specified in regulation 4(2)”.
210
PART F
148 Section 29(1) of the Aadhaar Act expressly states that ‘core biometric
information can never be shared with anyone for any reason whatsoever or be
used for any purpose other than generation of Aadhaar numbers and
contradicted by Section 29(4)253 of the Act, the proviso to which grants UIDAI
Moreover, sub-sections 29(1) and (2), in effect, create distinction between two
the Aadhaar Act are inclusive and expansive. Section 2(g) defines 'biometric
253 Section 29(4) states: “No Aadhaar number or core biometric information collected or created under this Act in
respect of an Aadhaar number holder shall be published, displayed or posted publicly, except for the purposes
as may be specified by regulations.”
211
PART F
Section 2(t) explains that the regulations are to be made by UIDAI, which is
the supreme authority under the Act. Sections 2(g), (j), (k) and (t) give
extent of also collecting ‘such other biological attributes’ that it may deem fit by
powers to add to the list of biometric details that UIDAI can require a citizen to
part with during enrolment which might even amount to an invasive collection
212
PART F
expected trait. Some people may be missing fingerprints due to skin or other
disease, which may cause further problems when enrolling a large population
such a case. Therefore, a large scale biometric scheme will usually need to
utilise more than one biometric. For example- both fingerprint and face to
The stability of even so called stable types of biometric data is not absolute.
may appear to be the same from a short distance, but there are actually small
differences in the pattern due to dryness, moisture and elasticity of the skin.
Moreover, cuts and scratches can alter the pattern. Similarly, even the iris, a
biometric identifiers.255
151 Sections 6256 and 31(2)257 of the Aadhaar Act place an additional onus
254Ramesh Subramanian, Computer Security, Privacy & Politics: Current Issues, Challenges & Solutions, IRM
Press, at pages 99-100
255Ibid, at page 100
256Section 6 states: “The Authority may require Aadhaar number holders to update their demographic information
and biometric information, from time to time, in such manner as may be specified by regulations, so as to
ensure continued accuracy of their information in the Central Identities Data Repository.”
257Section 31(2) states: “In case any biometric information of Aadhaar number holder is lost or changes
subsequently for any reason, the Aadhaar number holder shall request the Authority to make necessary
alteration in his record in the Central Identities Data Repository in such manner as may be specified by
regulations.”
213
PART F
biometric information may change from time to time. Natural factors like
ageing, manual labour, injury and illness can cause an individual’s biometric
program however point to the fact that provisions for updation fly in the face of
affair, as it is not and will never be. Moreover, there is no way in which a
person can estimate that he or she is due for an update, as this is not
is entitled to might be the only way one comes to the conclusion that his or her
provides:
258 L. Vishwanath, Four Reasons You Should Worry About Aadhaar's Use of Biometrics, The Wire (28 March,
2017), available at https://thewire.in/rights/real-problem-aadhaar-lies-biometrics
214
PART F
This raises the question as to how an individual will update his/her biometric
Regulation does not provide any real clarity on how updation should be taking
supposed to revisit the enrolment centre before all ten fingers and two
purposes of authentication?259
This is also evidence of the fact that an Aadhaar enrolment is not a one-time
affair.
individual access to the biometric information that forms the core of his or her
259 Ibid.
260 Section 28(5) states: “Notwithstanding anything contained in any other law for the time being in force, and
save as otherwise provided in this Act, the Authority or any of its officers or other employees or any agency
215
PART F
correctly or not in the first place is not possible. This becomes critical when
that same information forms the basis of identity and is the basis of
biometric identity in the database, as the individual has no means to verify the
biometric information that has been recorded at the time of enrolment. Even
an entity like the enrolment operator (with a software hack) could upload
data must at all times vest with the individual. Overlooking this fundamental
6 Biometric locking
153 Authentication Regulations 11 (1) and (4) provide for the facility of
that maintains the Central Identities Data Repository shall not, whether during his service or thereafter, reveal
any information stored in the Central Identities Data Repository or authentication record to anyone:
Provided that an Aadhaar number holder may request the Authority to provide access to his identity information
excluding his core biometric information in such manner as may be specified by regulations.”
261 L. Vishwanath, Four Reasons You Should Worry About Aadhaar's Use of Biometrics, The Wire (28 March,
216
PART F
The provision allowing biometric locking is salutary to the extent that it allows
unlock them only when needed for biometric authentication. But the regulation
provisions to remove such locking without any specified grounds for doing
so.262
7 Key takeaways
154 The use of biometric technology is only likely to grow dramatically both
in the private and public sector. On our part, we can only ensure that the
262 The Centre for Internet & Society, Analysis of Key Provisions of the Aadhaar Act Regulations, (31 March,
2017), available at https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-
regulations.
263 A. Cavoukian, Privacy and Biometrics, Information and Privacy Commissioner Canada (1999), available at
http://www.ipc.on.ca/images/Resources/pri-biom.pdf
264 Robert Gellman. Privacy and Biometric ID Systems: An Approach Using Fair Information Practices for
Developing Countries, CGD Policy Paper 028 Washington DC: Centre for Global Development (1 August
2013), available at https://www.cgdev.org/sites/default/files/privacy-and-biometric-ID-systems_0. pdf
217
PART F
design of the systems and the framework within which private and personal
when the technology is used for controlling access and to restrict unauthorized
protections which may be appropriate for the present state of technology will
265 Ibid
266 Ibid
267John D Woodward, Biometrics: Identifying Law & Policy Concerns, in Biometrics (AK Jain A.K, R Bolle, and S
Developing Countries, CGD Policy Paper 028 Washington DC: Centre for Global Development (1 August,
2013), available at https://www.cgdev.org/sites/default/files/privacy-and-biometric-ID-systems_0.pdf
269Ibid
218
PART F
problems after they arise. PIAs offer a formal way to consider and assess the
not mutually exclusive and can be combined to achieve the just and optimal
156 Of particular significance is the “Do Not Harm” principle which means
that biometrics and digital identity should not be used by the issuing authority,
or digital, must work for the public good and must do no harm. However,
identity systems due to their inherent power, can cause harm when placed
into hostile hands and used improperly. Great care must be taken to prevent
continual oversight.272
157 There are many adversarial actors – from private espionage groups to
foreign governments, who may try to exploit data vulnerabilities. There is also
instilling strong privacy protection laws and safeguards may decrease these
270 Ibid
271Pam Dixon, A Failure to Do No Harm – India’s Aadhaar biometric ID program and its inability to protect privacy
in relation to measures in Europe and the U.S., Health and Technology, Vol. 7 (2017), at pages 539–567
272 Ibid
219
PART G
democratic values, the government needs to curtail its own powers concerning
the tracking of all citizens and prevent the needless collection of data. Such
protections may assuage the fears and uphold the long-term legitimacy of
Aadhaar. If the legislative process takes into account public feedback and
basis for more digital initiatives, which are imminent in today’s digital age.
However, in its current form, the Aadhaar framework does not address the
158 The Union government has contended that the legitimate state interest
in pursuing the Aadhaar project flows from the solicitous concern shown in the
text and spirit of the Constitution for realising socio-economic rights. The right
to food must, according to the view proposed before the Court, trump over the
right to privacy. The Aadhaar project, it has been urged, seeks to fulfil socio-
economic entitlements.
159 The Constituent Assembly did not work in a vacuum. The idealism with
which the members of the Assembly drafted the Constitution was the result of
220
PART G
the “social content of the Independence movement”274, which came from the
sentiments”.275 The Constitution was the medium through which the nascent
274 Granville Austin, The Indian Constitution: Cornerstone of a Nation, Oxford University Press (1999) at page xxii
275 Ibid, at pages 62, xiii and xxii
276 Ibid, at page xxi
277 Ibid, at page 32
278 Arun K Thiruvengadam, The Constitution of India: A Contextual Analysis, (Bloomsbury 2017), at page 1
221
PART G
160 The draftpersons of the Constitution believed that the driving force to
bring social change rested with the State. This is evident from an instance
insurance. However, his social scheme was rejected on the ground that such
provisions should be left to legislation and need not be embodied into the
Constitution.280
161 The social and economic goals which were contemplated at the time of
Certain parts of the Constitution play a leading role in declaring the blueprint
of its social intent. Directive Principles were specifically incorporated into the
Constitution for this purpose. Though not enforceable in courts, the principles
are “fundamental in the governance of the country” and it is the duty of the
State to apply these principles while making laws.281 The essence of the
obligation on the State to secure a social order for the promotion of the
279 Granville Austin, The Indian Constitution: Cornerstone of a Nation, Oxford University Press (1999) at page 66
280 Ibid, at page 99
281 Article 37, The Constitution of India
222
PART G
“(1) The State shall strive to promote the welfare of the people
by securing and protecting as effectively as it may a
social order in which justice, social economic and political,
shall inform all the institutions of the national life.
(c) that the operation of the economic system does not result
in the concentration of wealth and means of production to
the common detriment;
..
(e) that the health and strength of workers, men and women,
and the tender age of children are not abused and that
citizens are not forced by economic necessity to enter
avocations unsuited to their age or strength;
“41. The State shall, within the limits of its economic capacity
and development, make effective provision for securing the
right to work, to education and to public assistance in cases
223
PART G
Article 47 casts a positive obligation upon the State to raise the level of
nutrition and the standard of living and to improve public health, as among its
“easily the lengthiest fundamental law in the world, probably ranks also as one
Gadbois states:
282George H Gadbois, JR, Supreme Court of India: The Beginnings (Vikram Raghavan and Vasujith Ram eds.),
Oxford University Press (2017), at page 193
224
PART G
The sanction behind the Directives, according to him “is political and not
juridical”. On the other hand, the fundamental rights are justiciable because
Article 13 provides that a law which takes them away or abridges them will be
225
PART G
dialogue. Over time, the values enshrined in the Directive Principles have
been read into the guarantees of freedom in Part III. In incremental stages, the
meaning and ambit of the fundamental rights guaranteed by Part III of the
of the United Nations. Social welfare legislation is but a step to achieve those
goals. The enactment of the National Food Security Act 2013 constituted a
level. The Act discerns a targeted Public Distribution System for providing
food-grains to those below the poverty line. The rules contemplated in Section
286 Minerva Mills Ltd. v Union of India, (1980) 3 SCC 625
226
PART G
2005 which was enacted for the enhancement of livelihood and security of
Both the National Food Security Act 2013 and the MGNREGA Act 2005 follow
employment guarantee are channelised to those for whom they are meant.
164 Many scholars have delved into the substantive themes of the Indian
Constitution. Upendra Baxi has argued that the Indian Constitution has four
notes that they are “intertwined and interlocked with the rest and, in
287Upendra Baxi, “A known but an indifferent judge”: Situating Ronald Dworkin in contemporary Indian
jurisprudence, International Journal of Constitutional Law, (2003) at page 582
227
PART G
social past and their future images”.288 Development is a leading aspect of our
the growth of the gross domestic product or industrial output. The central
interference by the state into human affairs. Liberty assumes the character of
the state. This formulation of political rights reflects the notion that the state
individual decisions and choices. What the state is prevented from doing is
state action. They postulate a restriction on the state. Isaiah Berlin formulates
state. Modern ideas of neo liberalism have funnelled this notion. Neo-
288 Ibid
289 Amartya Sen, Development as Freedom, Oxford University Press (2000), at page xii
290 Isaiah Berlin, Two Concepts of Liberty, available at
http://faculty.www.umb.edu/steven.levine/courses/Fall%202015/What%20is%20Freedom%20Writings/Berlin.p
df
228
PART G
obstacles. Resultantly, this notion of liberty regards the role of the state in a
to use its authority for redistribution of wealth would in this conception not be a
167 The notion that liberty only consists of freedom from restraint does not
complete the universe of its discourse. Broader notions of liberty are cognizant
of the fact that individuals must be enabled to pursue their capacities to the
access education, resources and the means to a dignified life. This approach
Freedom”292:
291 F A Hayek, The Constitution of Liberty, Routledge & Kegan Paul, (1960) at pages 11, 207-208
292 Amartya Sen, Development as Freedom, Oxford University Press (2000) at page 3-4
229
PART G
social and economic deprivation, the role of the state is not confined to an
230
PART G
basic rights, the state is subject to positive duties to further the fulfilment of
freedom.
169 The broader conception of freedom and liberty which emerges from the
writings of Sen and Nussbaum has direct consequences upon how we view
civil and political rights and socio-economic rights. The distinction between
the two sets of rights becomes illusory once civil and political rights are
such measures as would achieve true freedom. Henry Shue295 suggests that
to protect mandate that the state must restrain others in the same manner as
individuals. The duty to fulfil connotes aiding the deprived in the realisation of
294Martha Nussbaum, Women and Human Development, Cambridge University Press, (2000)
295Henry Shue, Basic Rights: Subsistence, Affluence and US Foreign Policy, Princeton University Press, Second
Edition (1996)
231
PART G
rights. This imposes a corresponding duty to create the conditions which will
facilitate the realisation of the right. The right which is protected for the
individual will also signify an expectation that the state must create institutions
realisation of rights. These positive duties of the state are readily apparent in
the context of welfare entitlements when the state must adopt affirmative
steps to alleviate poverty and the major sources of economic and social non-
freedom. But the thesis of Nussbaum and Shue have an important role for the
highly networked and technology reliant world, individual liberty requires the
state to take positive steps to protect individual rights. Data protection and
individual privacy mandate that the state put in place a positive regime which
recognises, respects and protects the individual from predatory market places.
in which the individual has access to remedies both against state and non-
state actors, both of whom pose grave dangers of assault on the individual as
that vision:
232
PART G
and political spheres and would be guided by the values of the Constitution.
170 Social opportunities are the facilities and “arrangements that society
activities. Social security programmes flow from ‘economic and social rights’−
recognized for the first time under the Universal Declaration on Human
Rights, 1948 include a large list of freedoms and claims under its “protective
233
PART G
umbrella”. They include not only basic political rights, but the right to work, the
join trade unions and even the right to just and favourable remuneration. 299
and other economic and social deprivations are at the centre stage in the
social security and to the realisation of economic, social and cultural rights.
Those rights are stated to be indispensable for dignity and to the free
with the organisation and the resources of each state. Article 22 stipulates
that:
“Article 22
Everyone, as a member of society, has the right to social
security and is entitled to realization, through national effort
and international co-operation and in accordance with the
organization and resources of each State, of the economic,
social and cultural rights indispensable for his dignity and the
free development of his personality.”
(i) the right to work; (ii) free choice of employment; (iii) just and favourable
conditions of work; (iv) protection against unemployment; (v) equal pay for
equal work without any discrimination; (vi) just and favourable remuneration
for work; and (vii) formation and membership of trade unions. Article 23
234
PART G
construes these rights as a means of ensuring both for the individual and the
India having adopted the UDHR, its principles can legitimately animate our
security. Both the articles recognise the intrinsic relationship between human
are integral to the realisation of economic freedom and to fulfil the aspiration
171 India adopted and ratified the Covenant on Civil and Political Rights as
well as the Covenant on Economic, Social and Cultural Rights. India acceded
According to the Preamble, the states who are parties to the Covenant have
recognized that:
Freedom is thus defined in terms of the absence of fear and want. Moreover,
235
PART G
social and cultural as well as civil and political rights. There is in other words
“Article 11.
1. The States Parties to the present Covenant recognize the
right of everyone to an adequate standard of living for
himself and his family, including adequate food, clothing
and housing, and to the continuous improvement of living
conditions. The States Parties will take appropriate steps
to ensure the realization of this right, recognizing to this
effect the essential importance of international
cooperation based on free consent.
236
PART G
The Guidelines also stipulate that like civil and political rights, economic,
social and cultural rights impose three different types of obligations on states :
the obligation to respect, protect and fulfil. The guidelines recognize that
violations of economic, social and cultural rights can occur through acts of
states to take measures emanating from their legal obligations may result in
such violations. Among them is the failure to enforce legislation or to put into
rights contained in the Covenant. Clauses 16, 21 and 27 of the guidelines are
thus:
The office of the UN High Commissioner for Human Rights notified General
Comment No. 3, which was adopted at the fifth session of the Committee on
237
PART G
states:
mechanisms to ensure that the available resources reach the beneficiaries for
173 Section 2(1)(f) of the Protection of Human Rights Act 1993 specifically
238
PART G
Under Section 12(f), the National Human Rights Commission has been
international law under the above covenants as a part of the national effort to
to that mission. In his classic work “The Idea of Justice”, Amartya Sen has
(expansion of human capability). Dreze and Sen have dealt with this
300 Amartya Sen, The Idea of Justice, Penguin (2009) at page 381
239
PART G
The authors have further observed that apart from education and healthcare,
India faces larger issues of accountability in the “public sector as a whole”. 302
The lack of progress in public services acts as a huge barrier to improve the
common man.
175 The State has a legitimate aim to ensure that its citizens receive basic
expenditure that the State incurs in providing subsidies and benefits to the
301 Jean Dreze and Amartya Sen, An Uncertain Glory, Penguin (2013), at pages x and xi
302 Ibid, at page xi
303 Jean Dreze and Amartya Sen, An Uncertain Glory, Penguin (2013), at page 33
304 Amartya Sen, The Idea of Justice, Penguin (2009) at page 349
240
PART G
concern to check that the welfare benefits which it marks for those, who are
acts as an instrument for the realization of the benefits arising out of the social
fulfils the State’s concern that its resources are utilised fully for human
development.
It has been contended by the Respondents that since the establishment of the
residents. The number would subserve two purposes. First, it would serve as
beneficiaries for the transfer of social welfare benefits, provided by the state.
programmes is that benefits do not reach the targeted population. The reason
305 Jean Dreze and Amartya Sen, An Uncertain Glory, Penguin (2013), at page 100
241
PART G
for this may have something to do intrinsically with the condition of the
Migrant labour and labour in the unorganised sector lacks fixity of abode. The
nature of their work renders their lives peripatetic. Nomadic tribes, particularly
in inaccessible areas, may not have fixed homes. In many cases, traditional
and the differently abled may face significant difficulties in accessing benefits
life and livelihood. Before the adoption of Aadhaar based-identity, there were
capture. While on the one hand, large swathes of the population had no
benefit to which that individual is not entitled. Fake identities compound the
242
PART G
shell identities. Policy makers were confronted with the serious problems
posed by fake and multiple identities since they imposed a burden on the
exchequer while at the same time diluting the efficacy of state designed social
where persons who are not entitled to benefits secure them in the guise of
being persons entitled to them. When imposters secure benefits which are
not meant for them, they deprive in the process, persons who are genuinely
them. This raises serious concerns of the deprivation of human rights. The
protect its populace from human want and need. The resources deployed by
the state are from its public revenues. When designing a unique measure of
eligible for social welfare benefits should obtain them. No person who is
entitled should be excluded. Individuals who do not qualify for social welfare
must ensure that social welfare benefits reach the hands of those who fulfil the
those to whom social welfare benefits are not designed. This constitutes a
243
PART G
marginalised, especially those who live below the poverty line. Identification
177 These concerns form the basis of the Aadhaar (Targeted Delivery of
Financial and other Subsidies, Benefits and Services) Act, 2016. As its
following aspects:
244
PART G
individuals.
resident. This identity, in the form of an Aadhaar number, is obtained upon the
enrolment. The legislative design envisages that the identity of the individual is
245
PART G
establishing the identity of the individual who seeks social welfare benefits
the sense that as a measure of state policy, it seeks to bring about financial
population including those who may not have been within the coverage of
seeks to ensure that social welfare benefits are obtained by persons eligible to
and subsidies which are funded from the Consolidated Fund of India. In the
seven decades since Independence, the Union Government has put into place
in ensuring that the welfare benefits which the state provides reach those for
246
PART G
statement of who an individual is. Our identities define who we are. They
express what we would wish the world to know us as. The human personality
is, at a certain level, all about identity, for it is through the assertion of identity
that each individual seeks to preserve the core of his or her humanity. An
relationships. The significance of our identity lies in our ability to express the
core of our beings. When the Constitution protects our right to be and to be
Identity may be, but is not always based upon immutable characteristics that
are defined at birth. What is immutable may not be or, at any rate, is not
being shaped by the social milieu in which human beings lead their lives.
Features about our biological being which are defined at birth are, after all, not
is because these immutable features are also constantly engaged with our
247
PART G
social and cultural environment. They shape and are influenced by that
environment.
vehicle and an arms license is needed to possess a fire arm. The holder of a
policy of medical insurance will have a card depicting his or her identity which
that “everyone has the right to recognition everywhere as a person before the
mandates that State parties undertake to respect the right of the child to
248
PART G
preserve his or her identity, including nationality, name and family relations as
held that gender identity is fundamental to and an essential component for the
identity has been held to be an essential facet of Article 21. In the view of this
Court:
249
PART G
self. The individual is a data subject since his or her data is stored in a
database. Shah notes that there is an ambivalence about whether the data
subject is the individual whose identity becomes the basis of validating the
data or whether the data subject is the identity of the individual as it gets
308Nishant Shah, Identity and Identification – the Individual in the Time of Networked Governance, Socio Legal
Review, available at http://www.sociolegalreview.com/wp-content/uploads/2015/12/Identity-and-Identification-
the-Individual-in-the-Time-of-Networked-Governance.pdf
309Manuel Castells, Conversation with Manuel Castells, Globetrotter, available at
http://globetrotter.berkeley.edu/people/Castells/castells-con4.html
250
PART G
184 The Aadhaar project was intended to allow a unique identity to enable
database systems”. Shah notes that ever since 2009, the terms ‘identity’ and
such as finger print and iris scan, which would be stored in a massive
centralized database. UIDAI posited that identification took place through its
have possessed one at all. Shah, in the course of his article, has this to state
about the conflation between identity and identification in the Aadhaar project:
310Nishant Shah, Identity and Identification – the Individual in the Time of Networked Governance, Socio Legal
Review, available at http://www.sociolegalreview.com/wp-content/uploads/2015/12/Identity-and-Identification-
the-Individual-in-the-Time-of-Networked-Governance.pdf
251
PART G
185 Identity includes the right to determine the forms through which identity
is expressed and the right not to be identified. That concept is now “flipped” so
that identification through identifiers becomes the only form of identity in the
The submission which has been urged on behalf of the petitioners is that an
Part III of the Constitution must have the ability to assert a choice of the
identity on the basis of one mode alone will, it is submitted, violate the right of
311 Ibid
252
PART G
(i) Name;
(ii) Date of Birth;
(iii) Gender;
(iv) Residential Address.
(ii) Relationship;
253
PART G
shall inform the individual who is undergoing enrolment of (i) the manner in
which the information shall be used; (ii) the nature of recipients with whom the
copies of supporting documents for proof of identity, address and date of birth.
documents which are accepted towards proof of identity and thirty three
allows the resident to identify herself through any of the stipulated documents
for the purpose of availing an Aadhaar number. The Aadhaar number can be
254
PART G
187 The Union Government is the custodian of the Consolidated Fund under
Article 266. All revenues received by the government form part of the
accordance with law and for the purpose and in the manner” which is provided
has been submitted by the respondents, had the Aadhaar Act enacted through
Parliament. The Act places a restriction on the right of the individual to utilize
any other identification save and except for the Aadhaar number, for the
number mandatory for the delivery of benefits, services and subsidies funded
from the Consolidated Fund is to confirm the identity of the individual to whom
255
PART G
the benefit is being transferred. This was in order to ensure that the benefits
under social welfare programmes funded by the Consolidated Fund reach the
sums of money in its welfare schemes was apprised of the fact that money
which was meant for the beneficiaries was being siphoned off through ghosts
with this evil that the Aadhaar project assumed a statutory character in 2016.
Through the provisions of the law, Parliament intended that Aadhaar should
view of the legislating body that the use of biometrics would render it difficult, if
and ghost identities. Where the State expends large sums on social welfare
deploys reach the hands of those for whom they are meant.
Thus, there are two important facets of the Aadhaar regime which must be
256
PART G
consent when the individual parts with identity information. The mandate of
Article 266 reinforces that mandate in its stipulation that all monies out of the
for the purpose of and in the manner provided by the Constitution. The State
doctrine of public trust. The state is under a bounden obligation to ensure that
its revenues which are placed in the Consolidated Fund are appropriated in
accordance with law and are not diverted for extraneous purposes. These
has a vital interest in ensuring that public revenues are duly accounted, that
the Consolidated Fund is utilized for purposes authorized by law; that funds
for development reach genuine beneficiaries and that scarce public resources
257
PART H
meant for those at the foot of the socio-economic ladder are not mis-utilized
by rent-seeking behavior.
H Proportionality
Aadhaar project and the Aadhaar Act on various grounds including the
violation of the fundamental rights of citizens including the right to privacy and
of identity and empowers citizens to realise various facets of the right to life,
189 The learned Attorney General has argued that the use and
prevent ‘leakages’. He submits that the Aadhaar scheme satisfies the test of
proportionality: it has a rational nexus with the goal that it seeks to achieve,
and since welfare benefits enhance the right to live with dignity, the latter will
prevail over the right to privacy. Mr Rakesh Dwivedi, learned Senior Counsel
has argued that the “least intrusive test” is not accepted in Indian
issue for which the Court lacks the requisite expertise. He states that this
258
PART H
who equally have no expertise in the field” and that “such an exercise involves
research, study by the experts and courts cannot substitute the same”. Mr
“at the moment” are no more than is necessary for ensuring that the “avowed
objects” are served, and that they balance individual interests (fundamental
rights) with societal interests (directive principles). He further submits that the
fact there are various limitations in place ensure that “some balance” is
achieved between the breach of privacy and the object sought to be achieved.
This Court must now perform the delicate task of ‘balancing’ these competing
190 In the 2003 edition of his celebrated work, Granville Austin recounts the
words of Prime Minister Morarji Desai that freedom and bread are not
social revolution could come in conflict with one another creating challenges
for those who work with the Constitution.316 Some of the questions inherent in
315 Granville Austin, Working a Democratic Constitution: A History of the Indian Experience, Oxford University
Press (2003), at page 652
316 Ibid, at page 651
259
PART H
the Constitution according to him are “Democracy for whom? Justice for
whom? What is Justice? What are the appropriate means of employing the
that they insisted that neither the strand of social revolution nor the strand of
The ostensible conflict between bread and freedom has also been explored in
1984 which he calls the “the great gift of classical and contemporary human
human rights thought and action to new arenas and constituencies as “New
rights arise from the womb of the old.”320 He draws on the distinction between
basic human needs and human rights and argues that the constant struggle
between these two forces is the essence of the difference between the right to
be human approach and the human rights approach.321 It is rightly pointed out
ascribed to the term “development”, it must ensure that people will not be
317 Ibid
318 Ibid
319Upendra Baxi, From Human Rights to the Right to be Human: Some Heresies, India International Centre
260
PART H
Thus, the broader matrix of human rights includes within it the inalienable and
fundamental right to always ‘be and remain human’. Professor Upendra Baxi
notes that this broader debate between human rights and the ‘right to be
historically, freedom might have been chosen over bread due to the vast
all be meaningless.323 At the same time, Baxi points out the danger in
choosing bread at the cost of freedom, given that historically in the absence of
freedom, human beings have been subject to the most egregious indignities:
261
PART H
Baxi concludes that the choice between bread and freedom is a false
antithesis. The challenge is not a choice in the abstract between bread and
“But the issues are not really "bread" and/or "freedom" in the
abstract, but rather who has how much of each, for how long,
at what cost to others, and why. Some people have both
"bread" and "freedom"; others have "freedom" but little
"bread" or none at all; yet others have half a loaf (which is
better than none, surely!) with or without freedom; and still
others have a precarious mix where "bread" is assured if
certain (not all) freedoms are bartered.”326
It is the foremost duty of the State to work towards achieving and maintaining
a fine balance, taking into account these myriad considerations. The State
must always be guided by the knowledge and sense of duty that in a true
democracy, the citizens cannot be made to choose between rights and needs,
as they are equally entitled to both. As the sentinel of justice and protector of
remember that both ‘bread’ and ‘freedom’ play a vital role in the guaranteeing
to our citizens the gamut of human rights and freedoms that make human
existence meaningful.
191 While exercising judicial review, courts are often confronted with
arising from the assertion of rights and discord arising out of the assertion of
325 Ibid, at page 186
326 Ibid, at page 186
262
PART H
the same right by two or more individuals. Conflicts between rights arise when
speak and to express may affect the dignity of another. A person may be
aggrieved when the free exercise of the right to speak by someone impinges
upon his or her reputation, which is integral to the right to life under Article 21.
under Article 19(1)(a) by one citizen and the sense of injury of another who
claims protection of the right to dignity under Article 21. Conflicts also arise
when the exercise of rights is perceived to impact upon the collective identity
impinges upon the protection afforded to another individual under the rubric of
the same human right. Such a situation involves a conflict arising from a
assertion of the right to life under Article 21. The right to a dignified existence
is also protected by the same Article. A conflict within Article 21 may involve a
situation when two freedoms are asserted as political rights. A conflict may
umbrella of the right to life stands in conflict with the assertion of an economic
Constitution.
263
PART H
would be one which would preserve the core of the right for both sets of
drawing balances is not a simple task. Balances involve sacrifices and the
value judgment is inevitable. The balance which the court draws may be open
balances, the court can pursue an objective formulation by relying upon those
values which the Constitution puts forth as part of its endeavour for a just
society. Our Constitution has in Part III recognised the importance of political
freedom. In Part IV, the Constitution has recognised our social histories of
discrimination and prejudice which have led to poverty, deprivation and the
in balance with Part IV is integral to the vision of social and economic justice
192 Several decisions of this Court over the last two decades have sought
to bring order to the clash between fundamental rights. In People’s Union for
264
PART H
Civil Liberties (PUCL) v Union of India327, this Court was called upon to
assets of candidates and their spouses at an election) with the right to privacy
implicit in Article 21. In drawing the balance, a bench of three Judges of this
Court held:
The Court held that the provision contained in the Representation of People
Act 1951 for a disclosure of assets and liabilities only to the Speaker or to the
Chairman of the House did not adequately protect the citizen’s right to
expression.
Kerala329, this Court dealt with a conflict between the right to information
265
PART H
The Court held that the balance between the right to information and the right
to privacy is drawn under the Right to Information Act 2005: if the information
interest, reasons have to be recorded because the person from whom the
the right to information protected by Article 19(1)(a) and the right to privacy
on the ground that it would violate the right to life guaranteed by Article 21.
Noting that there was a need to draw a balance between the assertion of
330 Ibid, at page 112
331 (2013) 6 SCC 620
266
PART H
several rights including the protection of the environment, the Court observed
speaking for a Bench of two judges emphasised the need for a sense of
Article 19(2).
267
PART H
within Article 21. There was on the one hand an assertion of the right to life on
trial, and the protection of the interests of the victim which was also relatable
to the same fundamental right under Article 21. In resolving the conflict, the
interests”:
196 These decisions indicate that the process of resolving conflicts arising
out of the assertion of different fundamental rights and conflicts within the
268
PART H
just balance this Court has applied norms such as the ‘paramount public
edifice of the Constitution is founded. Neither can exist without the other.
the constitutional guarantees founded on freedom and the rule of law. The
political freedoms as well as basic human rights. A just balance between the
the question is related to the limiting the right to privacy, Puttaswamy requires
standard for resolving disputes that involve either a conflict between two rights
337JudMathews and Alec Stone Sweet, All things in Proportion? American Rights Review and the Problem of
Balancing, Emory Law Journal, Vol. 60 (2011)
269
PART H
jurisprudence on privacy has evolved from the “right to be let alone”, to now
198 Subjecting the Aadhaar scheme to the test of proportionality does not
mean that the Court is second-guessing the wisdom of the legislature. State
constitutional muster. The test of proportionality stipulates that the nature and
extent of the State’s interference with the exercise of a right (in this case, the
proportionate to the goal it seeks to achieve (in this case, purported plugging
338Alec Stone Sweet & Jud Mathews, Proportionality Balancing and Global Constitutionalism, Columbia
Journal of Transnational Law, Vol. 47 (2008)
339Jud Mathews and Alec Stone Sweet, All things in Proportion? American Rights Review and the Problem of
Comparative Law Vol. 59 (2011) (cited in); Etienne Mureinik, A Bridge to Where? Introducing the Interim Bill of
Rights, South African Journal on Human Rights, Vol. 10 (1994)
342Andrew B. Serwin, Privacy 3.0 – The Principle of Proportionality, University of Michigan Journal of Law
270
PART H
a test to determine the extent to which fundamental rights can be limited in the
interest aims. Aharon Barak, the former Chief Justice of the Supreme Court of
In applying the proportionality test, the Court cannot mechanically defer to the
343 Adalah v. The Minister of Interior, HCJ 7052/03, English translation available at
http://elyon.court.gov.il/files_eng/03/520/070a47/03070520.a47.pdf
344 Om Kumar v Union of India, (2001) 2 SCC 386
271
PART H
The early decisions of this Court may not have used the expression
“proportionality”. But the manner in which the court explained what would be a
certain areas from manufacturing bidis. The object of the law was to ensure
the supply of adequate labour for agricultural purposes in areas where bidi
be engaged in agricultural labour. The Court held that the State need not have
272
PART H
19(1)(c) of the Constitution. Chief Justice Patanjali Sastri, speaking for the
Section 144 of the Code of Criminal Procedure on the ground that it violated
sub-clauses (b), (c) and (d) of Clause (1) of Article 19 of the Constitution.
273
PART H
“reasonable restriction” was held to mean that the limitation imposed on the
274
PART H
interpretation of proportionality.
that proportionality is the correct test to apply in the context of Article 19(6).
275
PART H
Justice Sikri held that laws limiting constitutional rights must satisfy the test of
proportionality:
276
PART H
speaking for four judges, laid down the tests that would need to be satisfied
under our Constitution for violations of privacy to be justified. This included the
test of proportionality:
The third principle (iii above) adopts the test of proportionality to ensure a
rational nexus between the objects and the means adopted to achieve them.
with the fundamental right. In determining this, the court will have regard to
whether a less intrusive measure could have been adopted consistent with the
277
PART H
205 Since some of the concerns raised by the Aadhaar scheme have arisen
278
PART H
need to balance the interests of society with those of individuals and groups.”
challenge to the German Federal Census Act, 1983, which provided for
the ground that they enabled authorities to compare census data with local
housing registries. The Court observed that the combination of statistical data
informational self-determination.
279
PART H
drawing from Articles 1(1) and 2(1) of the German Constitution, which protect
the fundamental right to human dignity and the right to freely develop one’s
observed that distinct silos of data “can be pieced together with other data
that too with, “the person concerned having no means of controlling its truth
367Jürgen Bröhmer et al., “BVerfGE 65, 1 - Census Act” in 60 Years German Basic Law: The German
Constitution and its Court - Landmark Decisions of the Federal Constitutional Court of Germany in the Area of
Fundamental Rights (Suhainah Wahiduddin ed.), (2012) at Pages 147-148, available at
http://www.kas.de/wf/doc/kas_32858-1522-1-30.pdf?121123115540
368 Census Act Case, (1983)
280
PART H
person with the aid of automatic data processing are practically unlimited and
not absolute and that public sector entities could collect personal data under
certain conditions. The Court held that there must be a statutory basis for this
281
PART H
and proportionality, not only must the purpose for which data is being
collected be specified at the time of collection, but the data acquired must also
not exceed that which is absolutely necessary for accomplishing the specified
purpose. In light of this, the Court directed the German Parliament to amend
the law in certain particulars before the census could be carried out, and to
close all loopholes in the law that may lead to abuses in the collection,
208 The ECtHR dealt with whether retention of DNA samples of individuals
who were arrested but who were later acquitted or had charges against them
282
PART H
Kingdom,374 the ECtHR noted the “blanket and indiscriminate nature of the
power of retention”:
283
PART H
insignificant.”
209 In 2012, the French Constitutional Council (“Council”) – the body that
among the provisions that were struck down. Article 3 authorized that the
national ID card may contain data which would enable the holder to identify
“If requested by its holder, the national identity card may also
contain data, stored separately, enabling it to identify itself on
electronic communication networks and to affix its electronic
signature. Upon each use, the interested party shall decide
which identification data are to be transmitted electronically.”
The Council observed that Article 3 did not stipulate the nature of the data that
284
PART H
which would include, in addition to the marital status and residence of the
holder, their height, eye colour, fingerprints and photograph for the issuance
The Council relied on Article 34 of the French Constitution to hold that it was
public order and bringing offenders to justice on one hand, and the right to
privacy on the other. The Council placed reliance on the Declaration of the
Rights of Man and the Citizen of 1789. Article 2 of the Declaration states “The
imprescriptible rights of Man. These rights are liberty, property, safety and
Article 2 includes the right to respect for private life, and accordingly, that “the
Council held that Article 5 violated the French Constitution as the nature of the
data collected was such that it would facilitate the identification of French
285
PART H
citizens on the basis of their fingerprints, thus breaching the right to respect
published in the official gazette of France, without Articles 3 and 5, which had
ECtHR held that the regulations on the storage of DNA profiles did not provide
286
PART H
individuals with sufficient protection, due to its duration and the fact that the
data could not be deleted. The Court concluded that the regulations failed to
strike a balance between competing public and private interests and held,
unanimously, that there had been a violation of Article 8 (right to respect for
was asked whether a decree regulating the use and storage of data from
biometric passports was lawful. One of the stipulations of the decree was that
eight fingerprints were stored by the authorities, while only two were required
for the passport. The Conseil d'Etat stated that the collection and retention of
212 In Digital Rights Ireland Ltd v Minister,381 the Court of Justice of the
European Union held that the EU legislature had exceeded the limits of the
379The Conseil d’Etat (Council of State) is a body of the French government that acts as legal advisor of the
executive branch and as the supreme court for administrative justice
380 Conseil d’ Etat in France, 26 October 2011
381 C‑293/12 and C‑594/12
287
PART H
time of use of all e-mails, phone calls and text messages sent or received.
The Court applied the test of proportionality to the measures. It was noted
private life, and dragnet data collection creates a chilling effect based on the
sense that one’s life is subject to surveillance at all times. On the nature of
The Court found that surveillance serves an important public interest – public
security – and that the right to security is itself a fundamental right under
288
PART H
The Court criticized the Directive for failing to lay down any clear or precise
rules governing the extent of the interference with the fundamental rights
enshrined in Articles 7 and 8 of the Charter. It observed that the Directive was
289
PART H
The Court concluded that the Directive failed to set out “clear and precise
rules”388 for access or for how states should judge the period of time for which
interference with those fundamental rights in the legal order of the EU, without
down the Directive on the basis of the scope of the data to be retained, 390 the
Of crucial importance is the Court’s emphasis that the judicial review of the EU
respect for private life and the extent and seriousness of the interference with
290
PART H
that even highly important objectives such as the fight against serious crime
and terrorism cannot justify measures which lead to forms of interference that
291
PART H
The Court held that although the taking and storing of fingerprints in passports
constituted an infringement of the right to respect for private life and the right
the Privy Council heard an appeal from a judgment of the Supreme Court of
Identity Card (Miscellaneous Provisions) Act, 2013. The Act required biometric
The Supreme Court upheld provisions of the Act that provided for the
The appellant challenged the following provisions of the Act: (i) the storage of
292
PART H
information, in electronic form, for a national ID card under Section 5; (iv) the
in response to a request under Section 7(1)(b); and (v) the gravity of the
Mauritian Supreme Court. The challenge was on the ground that the
Civil Code.
Regarding the challenge to Section 4 (2)(c) of the Act, which provided that,
“every person who applies for an identity card shall allow his fingerprints, and
other biometric information about himself, to be taken and recorded … for the
purpose of the identity card,” the Supreme Court noted that the right to privacy
under Section 9(1) of the Constitution was not an absolute right and
interference with that right could be permitted under Section 9(2), if a law that
interfered with that right was in the interest, inter alia, of public order. The
Section 4(2)(c) fell foul of the Constitution, which was based on the test laid
293
PART H
The Committee reproduced the Mauritian Supreme Court’s holding that the
provisions of the Act which enforced the compulsory taking and recording of
9(1) of the Constitution,401 but that the law was justifiable on grounds of public
401 Maharajah Madhewoo v. The State of Mauritius & Anr., 2015 SCJ 177, at page 23
402 [2016] UKPC 30, at page 10
294
PART H
Thus, the Mauritian Supreme Court upheld provisions of the Act which
challenged Section 3 of the Act, which provided for biometric data to be stored
testimonies on the purpose of data collection, noted that though there may
have been a legitimate aim for storing and collecting this data, “sufficiently
strong reasons…to establish that such storage and retention of data for an
Thus, while the Supreme Court noted that the law providing for the storage
under Section 9(2) of the Constitution,405 it held that since the Respondent had
not established that provisions dealing with storage and retention were
295
PART H
The Judicial Committee did not interfere with the Supreme Court’s decision.
held that the law providing for the storage and retention of fingerprints and
215 The learned Attorney General has relied on cases from other
jurisdictions to buttress his contention that the collection and use of biometric
296
PART H
(“Bowen”).411 Only Acton, Skinner and Dionisio were decided in the context
Aadhaar program. In Acton, the court held that the action of the authorities
conducting random drug testing of high school athletes was legal since the
students were negligibly affected. In Skinner, the court found the actions of
court observed that railroad accidents, if not prevented, could cause massive
loss of life and property. Further, it was held that FRA’s regulations fulfilled a
railroads and were therefore, not “an undue infringement on the justifiable
that retention of patients’ information such as their name, address and age,
under the New York State Controlled Substances Act, 1972, was not in
violation of the constitutional right to privacy as the Court was satisfied that the
statute provided for proper safeguards and redressal against theft and loss of
telephones in order to investigate crimes. The Court held that “neither the
summons to appear before the grand jury, nor its directive to make a voice
297
PART H
security number, rejecting the argument that the use of a social security
number violated the Appellant’s Native American beliefs. The Court held that
the Free Exercise Clause of the First Amendment could not be construed to
Social Security Number on documents submitted to the Court, noting that the
216 Some decisions of lower courts in the US which have considered the
validity of laws or actions of the State deploying biometrics and which have
298
PART H
Brannon (“Brannon”).421 At first blush, it does seem that these cases support
the Respondents’ stand, however, we cannot lose sight of the context in which
sample from the buccal swab of the mouth of felony arrestees, who had not
been convicted, to be constitutional. The Court noted that the arrestees had
was de minimis in nature; there were stringent limits on the manner in which
the information was to be used; and the interest of the State in deterring future
and law enforcement. For the above reasons, the Court found that the
Ninth Circuit ruled that a law requiring individuals working in nuclear power
facilities to submit their fingerprints for identification and criminal history record
299
PART H
national stock exchanges to be fingerprinted, was upheld. The Court ruled that
Court held that fingerprint technology was the only reliable means of ensuring
bore a rational relationship to the State’s goal of promoting safe and lawful
use of highways. In Buchanan, the Court upheld the eligibility requirement for
challenge based on religious beliefs of the Petitioner. The Court held that the
Petitioner had failed to prove that the AFIS involved any invasive procedures,
noting that she had acknowledged that she had never seen finger imaging
performed and had no idea whether a laser was involved. In Stuller, the
300
PART H
residents” of a resort city from crime and loss, both against people and against
property, was upheld. In Kelly, the Circuit Court of Appeals rejected a claim
for return of fingerprints of the defendant which had been obtained after he
had been arrested by prohibition agents, holding that there was no reason to
Brannon, the court held that a law requiring “massagists” to submit their
obtain licenses was valid, noting that the fingerprints and photographs would
217 The cases cited by the learned Attorney General would not be
applicable in the context of the Aadhaar program. The cases cited dealt with
narrowly tailored legislations set out to achieve very specific objectives. For
would have led to national disasters. These national disasters in turn would
301
PART H
and photographs for identification. The objective behind these laws was
courts in these cases were also satisfied that the procedures involved in
The aforementioned cases will not apply in the backdrop of the Aadhaar
decided in the context of crime, require the State to at least form a reasonable
program treats every citizen as a potential criminal without even requiring the
or an identity fraud. When the State is not required to have a reasonable belief
302
PART H
2. The justification for rights-infringing measures that interfere with or limit the
3. The measures must be necessary to achieve the object and must not
4. Restrictions must not only serve a legitimate purposes; they must also be
5. The State must provide sufficient safeguards relating to the storing and
interference with privacy, the State must guarantee that the collection and
is authorised by law and that sufficient safeguards exist to ensure that the
data is only used for the purpose specified at the time of collection.
Ownership of the data must at all times vest in the individual whose data is
collected. The individual must have a right of access to the data collected
303
PART H
219 Privacy and proportionality are two interlocking themes that recur
widely available and individuals are not able to decide upon its disclosure and
use. This right of controlling the extent of the availability and use of one’s
with the right to privacy and not necessary in a democratic society. The
judgments hold that unlimited data retention and unrestricted state access
protection. They also emphasize the need to clearly stipulate the nature of the
data being collected and ensure its confidentiality. Provisions where these
recognize the need for public order and security, they emphasize the need to
strike a balance between safeguarding public order and the right to privacy.
304
PART H
which note that the collection and use of information must be limited to the
purpose specified by law and to the extent indispensable for the protection of
public interest. The striking of a balance between public and private interests
and relevance are seen by Courts as constituting grounds for striking down
the measure. While the State's imperatives are seen as relevant, emphasis is
imperatives and the need to prevent against abuse. Courts have upheld
regulations that are necessary to achieve the legitimate aims and not
The issue is whether the Aadhaar project and the Act, Rules and Regulations
305
PART H
222 Under Aadhaar, the State has put forth an objective of transferring
subsidies and entitlements to its citizens. The aim was to curb leakages and
and services”. However, the Act in the present form has surpassed a tailored
violations of fundamental rights that result from the operation of the Aadhaar
that the right to privacy and its protection must be at the centre of the debate,
from the very onset of the decision to use biometric data. It is vital that
adequate safeguards are set down for every step of the process from
must be informed about the collection procedure, the intended purpose of the
collection, the reason why the particular data set is requested and who will
have access to their data. Additionally, the retention period must be justified
and individuals must be given the right to access, correct and delete their data
purpose should always act as a shining light and adequate caution must be
306
PART H
taken to ensure that there is no function creep with the lapse of time, in order
to prevent the use of the data for new, originally unintended purposes.
specific legislation so that the right to privacy is not only recognized but
protected in all its aspects. Meeting this obligation would necessarily mean
also have a strong impact on the privacy protections provided by the biometric
system.
During the course of the hearing, the CEO of UIDAI, Mr Ajay Bhushan Pandey
Divan, counsel for the petitioners had served a list of questions to the
verified by any official of UIDAI or of the Government. UIDAI does not take
307
PART H
database. It delegates this task to the enrolment agency or the Registrar. The
223 UIDAI does not identify the persons who enrol within the Aadhaar
of the Aadhaar number holder in CIDR. Based on the match, UIDAI provides
The task of verifying whether a person is an illegal resident has also been left
person has been residing in India for 182 days or more in the past twelve
declaration which has been provided in the Aadhaar enrolment forms is thus:
308
PART H
224 The petitioners have argued that persons who were enrolled under the
Aadhaar programme before the Act came into force on 12 September 2016
(more than a hundred crore) were not even required to make this declaration.
The authenticity of the documents submitted (along with the declaration) is not
checked by UIDAI.
the Requesting Entity. On this aspect, the response which has been provided
309
PART H
reply to the question of the petitioners asking the reasons for blacklisting of
the enrolment operators, UIDAI has stated that a data quality check is done
during the enrolment process and if any Aadhaar enrolment is found to be not
to be compliant with the UIDAI process, the enrolment gets rejected and an
blacklisted/removed from the UIDAI ecosystem for the following reasons: (a)
illegally charging residents for Aadhaar enrolment; (b) poor demographic data
quality; (c) invalid biometric exceptions; and (d) other process malpractices.
that use the Yes/No authentication facility provided by UIDAI. 424 “Yes/No
310
PART H
information and Aadhaar number securely submitted with the consent of the
Aadhaar number holder through a requesting entity, are matched against the
data available in the CIDR, and the Authority responds with a digitally signed
response containing a “Yes” or “No”, along with other technical details related
with the consent of the Aadhaar number holder through a requesting entity,
are matched against the data available in the CIDR, and the Authority returns
a digitally signed response containing e-KYC data along with other technical
requesting agency may permit any other agency or entity to perform Yes/ No
such entity through the portal provided by UIDAI to the said requesting entity.
It has also been clarified that sharing of a license key is only permissible for
authentication.427
311
PART H
The petitioners have contended that the points of service (PoS) biometric
requesting entity to store the PID block when “it is for buffered authentication
period of time, and that the same is deleted after transmission”. Thus, under
the Aadhaar project, requesting entities can hold the identity information of
Aadhaar architecture are capable of recording the date and time of the
312
PART H
response, UIDAI stated that it does not ask requesting entities to maintain any
logs related to the IP address of the device, GPS coordinates of the device
ensure that their systems are secure and frauds are managed, AUAs like
227 The process of sending authentication requests has been dealt with in
after collecting the Aadhaar number or any other identifier provided by the
number holder, the client application immediately packages and encrypts the
input parameters into the PID block before transmission and sends it to the
server of the requesting entity using secure protocols. After validation, the
further provides that the authentication request must be digitally signed by the
requested, the CIDR validates the input parameters against the data stored
313
PART H
case may be, along with other technical details related to the authentication
and is submitted along with the input parameters such that authentication is
requesting entity shall ensure that encryption of PID Block takes place at the
(d) the record of disclosure of information to the Aadhaar number holder at the
18(2) and 18(3) allow the retention of the logs of authentication transactions
by the requesting entity for a period of two years. Upon the expiry of two years
the logs have to be archived for a period of five years or the number of years
Upon the expiry of this period, the logs shall be deleted except those records
314
PART H
device identity related data and e-KYC response data. Under Regulations
20(2) and 20(3), authentication logs shall be maintained by the ASA for a
period of two years, during which period the Authority and/or the requesting
entity may require access to such records for grievance redressal, dispute
regulations. The authentication logs shall not be used for any purpose other
than that stated. Upon the expiry of the period of two years, the authentication
logs shall be archived for a period of five years. Upon the expiry of five years
entity whichever is later, the authentication logs shall be deleted except those
Section 2(d)428 of the Aadhaar Act allows storage of the record of the time of
428Section 2(d) states: “authentication record” means the record of the time of authentication and identity of the
requesting entity and the response provided by the Authority
315
PART H
The response further indicates that UIDAI gets the AUA code, ASA code,
unique device code, registered device code used for authentication, and that
UIDAI would know from which device the authentication has happened and
However, Regulation 26, which deals with the storage and maintenance of
Authentication Transaction Data clearly provides that UIDAI shall store and
information:
429AUA code, ASA code, unique device code, registered device code used for authentication, and that UIDAI
would know from which device the authentication has happened
430An important configuration could be IP address
316
PART H
The only data, which has been excluded from retention under this provision,
retained by UIDAI for a period of six months, and will thereafter be archived
for five years, upon which, the authentication transaction data shall be deleted
any pending dispute. These provisions indicate that under the Aadhaar
of the widely recognized data minimisation principles which seek that data
collectors and processors delete personal data records when the purpose for
Authentication User Agency (AUA) connects to the CIDR and uses Aadhaar
authentication to validate a user and enable its services. The responsibility for
the logistics of service delivery rests with the AUAs. In this federated model,
data related to the transaction, the location of the authentication can easily be
317
PART H
228 The petitioners have also brought the attention of this Court to bear on
an expert report, with respect to security and Aadhaar, which was filed along
with an Additional Affidavit dated 09 March 2018. The report dated 4 March
Review Committee of UIDAI. Professor Agarwal’s Report deals with the notion
collect and share aggregate information about user habits, while maintaining
the privacy of individual users. The Report states that differential privacy of a
protocol is the change in the privacy of people when the protocol is introduced
(ii) The reference database stores the Aadhaar number of a person along
318
PART H
(iv) The verification log records all ID verifications done in the past five years.
For each verification, it stores the biometric data, Aadhaar number, and
The report analyses the situation if any of the databases gets leaked. The
report remarks:
damaging the security and privacy of individuals since the report notes that
an individual in the past five years. A breach in verification log would allow a
third party to access the location of the transactions of an individual over the
past five years. The report indicates that it is possible through the Aadhaar
different from other databases such as PAN Card or driving license. The
319
PART H
held:
Justice Kaul also dealt with the need to regulate the conduct of private entities
320
PART H
230 Section 2(c) of the Aadhaar Act is capable of revealing the identity of an
authentication. Through meta data and in the light of the observations made in
Further, the verification logs reveal the details of transactions over the past
five years. The verification logs are capable of profiling an individual. Details
request was accepted/rejected), where it was sent from, and how it was sent.
231 The threat to privacy arises not from the positive identification that
that information without the consent of the data subject. This erodes the
personal control of an individual over the uses of his or her information. The
unauthorised secondary use of biometric data is perhaps the greatest risk that
UIDAI.
434Nancy Yue Liu, Bio-Privacy: Privacy Regulations and the Challenge of Biometrics, Routledge (2013) at page
76
321
PART H
August 2010) signed between UIDAI and L1 Identity Solutions (the foreign
entity which provided the source code for biometric storage). It has been
submitted by the petitioners that the contract gives L1 Identity Solutions free
access to all personal information about all residents in India. The contract
specifies that UIDAI (‘the purchaser’) has the right in perpetuity to use all
right belonging to L-1 Identity Solutions.435 UIDAI was provided the license of
“The Contract and the licenses granted herein are not a sale
of a copy of the software and do not render Purchaser the
owner of M/S L-1 Identity Solutions Operating Company’s
proprietary ABIS and SDK software.”436
of the purchaser, then, the contract provides that the former shall not further
322
PART H
third party other than the purchaser without the purchaser’s prior written
437 Ibid
323
PART H
Under the Contract, L-1 Identity Solutions retains the ownership of the
biometric software. UIDAI has been given only the license to use the software.
Neither the Central Government nor the UIDAI have the source code for the
been provided that L-1 Identity Solutions can be given access to the database
324
PART H
with L-1 Identity Solutions to provide any information to it for the performance
of the Contract. It has been provided in the Contract that L-1 Identity Solutions
would indemnify UIDAI against any loss caused to it. However, the leakage of
233 Mr Shyam Divan, learned senior counsel for the petitioners, has also
signed between UIDAI and various entities for carrying out the process of
executive authority, under the erstwhile Planning Commission and then under
has argued that the activities of the private parties engaged in the process of
enrolment had no statutory or legal backing. It was his contention that MOUs
signed between UIDAI and Registrars are not contracts within the purview of
Article 299 of the Constitution, and therefore, do not cover the acts done by
325
PART H
the private entities engaged by the Registrars for enrolment. In Monnet Ispat
The MoUs entered into by UIDAI do not fall within the meaning of Article 299
Enrolling agencies.
234 This Court held in Puttaswamy that any law which infringes the right to
abuse of the process. The Aadhaar Act envisages UIDAI as the sole authority
for the purpose of the Act. It entrusts UIDAI with a wide canvass of functions,
enrolling agencies, registrars and requesting entities. Currently, there are 212
Registrars and 755 enrolling agencies in different states of the country. 440
Responsibility has also been placed on UIDAI to manage and secure the
to ensure that data stored in CIDR is kept secure and confidential. It has been
placed with the responsibility for the protection of the identity information of
1.2 billion citizens. UIDAI is entrusted with discretionary powers under the
438 (2012) 11 SCC 1
439 Ibid, at page 153
440 As submitted by Mr Rakesh Dwivedi, learned senior counsel for the State of Gujarat
326
PART H
information of any individual with the biometric service providers (BSPs) for
235 The proviso to Section 28(5) provides only for a request to UIDAI for
access to information and does not make access to information a right of the
individual. This would mean that it would be entirely upon the discretion of the
UIDAI to refuse to grant access to the information once a request has been
made. It is also not clear how a person is supposed to know that the biometric
information contained in the database has changed if he/she does not have
access to it. UIDAI is also empowered to investigate any breach under the
Act, as a result of which any offence under the Act will be cognizable only if a
Under the Aadhaar architecture, UIDAI is the only authority which carries out
of the project. While the Act confers such major functions on UIDAI, it does
not place any institutional accountability upon UIDAI to protect the database
of citizens’ personal information. The Act is silent on the liability of UIDAI and
regulations made under it. Under Section 23(2)(s) of the Act, UIDAI is
327
PART H
violates the right to seek remedy. Under Section 47(1), a court can take
The law must specify who is to be held accountable. The Act lacks a
mechanism through which any individual can seek speedy redressal for
his/her data leakage and identity theft. Compensation must be provided for
UIDAI or a private entity, it is critical that the individual retains the right to seek
structure.442
227
328
PART H
the basic rights of individuals. The architecture of Aadhaar ought to have, but
principles for data protection.443 The principles should include that the means
of collection of data are fair and lawful, the purpose and relevance is clearly
provides robust safeguards for data protection, the Aadhaar Act does not
pass muster against a challenge on the ground of Article 14. The law fails to
meet the norms expected of a data protection regime which safeguards the
data of 1.2 billion Indians. The absence of a regulatory framework leaves the
law vulnerable to challenge on the ground that it has failed to meet the
237 The scheme of the Aadhaar Act is postulated on the norms enunciated
329
PART H
criminal offences are not a panacea for a robust regulatory framework under
law may not in itself be adequate to deal with all these violations in terms of
their volume and complexity. It is hence necessary that the criminal law must
there is a grave danger that the regime of data protection, as well as the
possesses neither the autonomy nor the regulatory authority to enforce the
Nor can the law rest in the fond hope that organized structures within or
330
PART H
regulatory mechanism. Absent such a mechanism, the state has failed to fulfil
the obligation cast upon it to protect the individual right to informational self-
determination.
have been laid down as guiding principles for the oversight mechanism such
239 Privacy concerns relating to the Aadhaar project have been the subject
distinguish one person from another. As biometric data can be usually linked
tracked, but it also creates the potential for the collection of an individual’s
can be used for functions other than that for which it was collected). Privacy
advocates believe that any identification scheme can be carried out with a
331
PART H
hidden agenda and that the slippery slope effect can be relevant to several
creep more likely and even attractive. The legal measures possible to control
function creep are still limited. However, there are several ways in which
function creep can be curtailed. They include (i) limiting the amount of data
that is collected for any stated purpose; (ii) enabling regulation to limit
privacy requires that data collection must not violate the autonomy of an
individual. The Court has held consent, transparency, and control over
privacy stand. The Court had made it clear that an individual has the right to
prevent others from using his or her image, name and other aspects of
332
PART H
241 Section 57 of the Aadhaar Act allows the use of an Aadhaar number for
establishing the identity of an individual “for any purpose” by the state, private
entities and persons. Allowing private entities to use Aadhaar numbers will
consent and could lead to individual profiling. The contention is that Section
privacy legislation that would balance the need for privacy protection with
security and sectoral interests, and respond to the need for domain legislation
on the subject. An approach paper for the legal framework for a proposed
legislation on privacy was prepared by the group and was uploaded on the
333
PART H
The Paper highlighted the potential of exploitation that the UID project
possessed. The potential was that the UID data could be used directly or
The Paper highlighted the need for a stringent privacy protection mechanism,
individual profiling.
Identification Authority of India Bill, 2010, which provided for the constitution of
334
PART H
to carry out the function of ascertaining the extent and pattern of usage of
Aadhaar numbers across the country. The Committee was required to prepare
a report annually in relation to the extent and pattern of usage of the Aadhaar
numbers along with its recommendations thereon and submit it to the Central
limit the extent to which Aadhaar numbers could be used. These provisions
have not been included in the Aadhaar Act, 2016. Instead, the Act allows the
use of Aadhaar number for any purpose by the State as well as private
arbitrariness.
243 Section 57 indicates that the legislature has travelled far beyond its
the Aadhaar platform for use by private entities overreaches the purpose of
enacting the law. It leaves bare the commercial exploitation of citizens data
335
PART H
244 The risks which the use of Aadhaar “for any purpose” carries is that
entities), the Aadhaar number becomes the central unifying feature that
connects the cell phone with geo-location data, one’s presence and
movement with a bank account and income tax returns, food and lifestyle
information which was usually unconnected and was considered trivial. 448
Thus, linking Aadhaar with different databases carries the potential of being
profiled into a system, which could be used for commercial purposes. It also
affecting their privacy and liberty. Profiling individuals could be used to create
447 Shweta Agrawal, Subhashis Banerjee, and Subodh Sharma, Privacy and Security of Aadhaar: A Computer
Science Perspective, Economic & Political Weekly (16 September 2017), Vol. 52, available at
https://www.epw.in/journal/2017/37/special-articles/privacy-and-security-aadhaar.html
448 Nishant Shah, Digital Native: Cause an effect, The Indian Express (17 June 2018), available at
https://indianexpress.com/article/technology/social/digital-native-cause-an-effect-5219977/
336
PART H
traces of Aadhaar number are left in every facet of human life, it will lead to a
to our age:
portents for the future. Unless the law mandates an effective data protection
framework, the quest for liberty and dignity would be as ephemeral as the
wind.
Profiling can impact individuals and their behaviour. Since data collection
for proof of identity, any such pattern in itself is crucial data that could be used
337
PART H
These preferences could also be used to influence the decision making of the
free choice. In the modern digital era, privacy protection does not demand that
data should not be collected, stored, or used, but that there should be
provable guarantees that the data cannot be used for any purpose other than
imperative that the state takes strong data privacy measures to prevent theft
external threats. The State is always open to threat from its adversaries, and
a national level identification system can become an easy target for anyone
risk in the process. Therefore, it is vital that state action ascertain security
not been dealt with by the Aadhaar Act. There is currently limited legislative or
338
PART H
246 At its core, the Aadhaar Act attempts to create a method for
benefits to them. The Preamble of the Act explains that the architecture of the
benefits and services” for which the expenditure is incurred from the
very wide. It leaves the door open for the government to route more benefits,
subsidies and services through the Consolidated Fund of India and expand
the scope of Aadhaar. Any activity of the government paid for from the
LPG, to use of roads and civic amenities, healthcare, and even rebates to tax
payers could come under such an umbrella. The scope of Section 7 could
cover every basic aspect of the lives of citizens. The marginalized sections of
society, who largely depend upon government’s social security schemes and
other welfare programmes for survival could be denied basic living conditions
schemes, including schemes for children (such as benefits under the Sarva
Shiksha Abhiyan or getting meals under the Mid-day meal scheme, painting
339
PART H
agriculture and farmers’ welfare, primary and higher education, social justice,
benefits for persons with disabilities, women and child development, rural
transport, culture, tourism, urban housing, tribal affairs and stipends for
internship for students. The list is ever expanding and is endless. These
its citizens. Every conceivable facility can be brought under the rubric of
across discreet data silos, which allows anyone with access to this information
race, religion, caste, tribe, ethnicity, language, income or medical history into
CIDR, the mandatory linking of Aadhaar with various schemes allows the
same result in effect. For instance, when an individual from a particular caste
340
PART H
rehabilitation schemes, she/he has to link the Aadhaar number with the
scavenger gets permanently fixed to her/his identity. What the Aadhaar Act
resident non-existent in the eyes of the State, and would deny basic facilities
expenditure from the Consolidated Fund) is not the same as that of other
Therefore, benefits and services cannot be measured with the same yardstick
cursor to the kind of function creep which is inconsistent with privacy and
341
PART H
facet of its engagement with citizens under the Aadhaar platform. Section 7
benefits.
defined to mean any provision, facility, utility, or any other assistance provided
unstructured terms under which the government can cover the entire gamut of
its activities involving an interface with the citizen. The provision has made no
necessary in each case and whether a less intrusive modality should suffice.
Both the definitions include such other services as may be notified by the
what benefits and services would be covered by the legislation. The manner
342
PART H
Pensioners grow older with passing age. Many of them suffer from the
tribulations of old age including the loss of biometrics. It is unfair and arbitrary
authentication. A right cannot be denied on the anvil of requiring one and only
the disbursal of pension to the person who is rightfully entitled. This aim of the
of the state is to ensure that the benefits which it offers are being availed of by
genuine students who are entitled to them. This legitimate aim can be fulfilled
343
PART H
The state has failed to demonstrate that a less intrusive measure other than
biometric authentication will not subserve its purposes. That the state has
and overbreadth which renders the inclusion of services and benefits arbitrary
249 Various entities are involved in the Aadhaar project. Their inter-
liberty. Without these safeguards, the legislation and its architecture cannot
450 Shankkar Aiyar, Aadhaar: A Biometric History of India’s 12-Digit Revolution, Westland (2017), at page 226
344
PART H
individual with the State. The notion that individuals possess only one, or at
plurality which constitutes the essence of our social culture. Amartya Sen in
Sen’s logic, drawn from how individuals express their personalities in the real
to a diverse set of liberties and freedoms, the Constitution allows for the
345
PART H
identities. Sen also rejects the notion that individuals “discover their identities
with little room for choice”. The support for such a notion, as he observes,
choice:
Sen rejects the above idea on the ground that it does not reflect a universally
valid principle. Undoubtedly, some identities are ‘given’. But even here, as
individual in all cases but whether the individual has a choice over the relative
Sen reasons that identity is a plural concept and the relevance of different
346
PART H
multitude of identities and the myriad forms of its expression. Our political
identities as citizens define our relationship with the nation state. The rights
An artist who paints, the writer who shares a thought, the musician who
composes, the preacher who influences our spirituality and the demagogue
who launches into human sensibilities are all participants in the assertion of
identity. In this participative process, the identities of both the performer and
a way of life which defines the uniqueness of our beings. The Constitution
identities and be guaranteed the right to express it in various forms. The state
347
PART H
respect them.
251 Technologies that affect how our identities function must be subject to
represents the quality of democracy. Our decided cases have recognized the
Githa Hariharan (Ms) v Reserve Bank of India459, the bar employee in Anuj
348
PART H
focus” and “the focal point of the Constitution”. Justice Kaul’s concurring
opinion recognised that the individual has the right to control her identity.464
It was submitted by the petitioners that a unique identity number infringes the
Ascribing to the holder of an Aadhaar card, a unique identity number must not
Section 7(1) indicates that its purpose is for establishing the identity of an
individual for the receipt of services, benefits or subsidies drawn from the
349
PART H
which could include information regarding her/his race, religion, caste, tribe,
the impact of technology is such that the scheme of Aadhaar can reduce
from these schemes defeats the rationale for the schemes which is to
government records and the affidavits filed by the petitioners point out glaring
disproportionate impact on the lives of the marginalized and poor. This Court
350
PART H
cannot turn a blind eye to the rights of the marginalized. It may be the fashion
an enabler. It has become a universal unifier of our age. Yet, the interface
railroad those on one side of that divide unconcerned about social and
errors in this case have led to grave injustice to the marginalized. The Court,
254 The institution of rights places a heavy onus on the State to justify its
restrictions. No right can be taken away on the whims and fancies of the
State. The State has failed to justify its actions and to demonstrate why
such as the right to food for citizens, automatically entails a sacrifice of the
right to privacy when both these rights are protected by the Constitution. One
right cannot be taken away at the behest of the other especially when the
State has been unable to satisfy this Court that the two rights are mutually
exclusive. The State has been unable to respond to the contention of the
351
PART H
petitioners that it has failed to consider that there were much less rights-
invasive measures that could have furthered its goals. The burden of proof on
the State was to demonstrate that the right to food and other entitlements
provided through the Aadhaar scheme could not have been secured without
the violating the fundamental rights of privacy and dignity. Dworkin in his
whether some rights are so important that the State is justified in doing all it
255 There is no antinomy between the right to privacy and the legitimate
carefully tailored for achieving a legitimate aim. While the right to food is an
important right and its promotion is a constitutional obligation of the State, yet
the right to privacy cannot simply and automatically yield to it. No legitimate
352
PART H
proportionality.
dignity. The nine judge Bench decision in Puttaswamy also emphasized the
context of the right to life (in Part III of the Constitution) has significant
implications both for the substantive content of the right and on the ability of
353
PART H
on the part of the State which forces an individual to part with her or his dignity
about the availability of food; debt bondage; low and highly underpaid work;
against467 are instances of the loss of dignity for the marginalized. The State
has social security programmes and legislation to improve the living conditions
authors, India has “utterly poor standards of the social services provided to
common folk, whether it is the Mid-day Meal Scheme, the Sarva Shiksha
healthcare at the primary health centres, district hospitals and even public
466Dr. Babasaheb Ambedkar: Writings and Speeches (Vol. 1), Dr. Ambedkar Foundation (2014)
467Harsh Mander, Living with Hunger: Deprivation among the Aged, Single Women and People with Disability,
Economic & Political Weekly (April 26, 2008), Vol. 43, available at
https://www.epw.in/journal/2008/17/special-articles/living-hunger-deprivation-among-aged-single-women-and-
people
354
PART H
Any action or inaction on the part of the State which is insensitive to and
legitimate under the Constitution, for the reason that such denial violates
human dignity. No individual can be made to part with his or her dignity.
Responsibility for protection of dignity lies not only with governments but also
It is in the above background that this Court must deal with the next contention
the finger print to a scale and then, a minutea. The claim of the petitioners is
468Dignity, Not Mere Roti, Economic & Political Weekly (10 August, 2013), Vol. 48, available at
https://www.epw.in/journal/2013/32/editorials/dignity-not-mere-roti.html
355
PART H
an Aadhaar number holder are matched with the biometric information stored
CIDR.469
Act. It has been contended that non-enrolment in the Aadhaar scheme and
non-linking of the Aadhaar number with the benefit, subsidy or service causes
subsidies, benefits and services provided under Section 7. Across the country,
it has been urged, several persons are losing out on welfare entitlements
356
PART H
exercise and unless the biometrics work, a person in flesh and blood, does not
by three basic means: “by something they know, something they have, or
something they are”.470 Biometrics fall within the last category, and, as such,
and this increases the probability of a mismatch. Human fallibility can produce
errors.471
Challenges & Opportunities”472. The report was based on a study carried out
by several reputed scientists and researchers under the aegis of the National
470United States General Accounting Office, Technology Assessment: Using Biometrics for Border Security
(2002), available at http://www.gao.gov/new.items/d03174.pdf.
471Jeremy Wickins, The ethics of biometrics: the risk of social exclusion from the widespread use of electronic
357
PART H
The report also took note of how changes in an individual’s biometrics may
The report had also stated that biometrics can result in exclusion of people if it
358
PART H
traits and data records has the potential to cause disenfranchisement, when a
Analysis”476, deals with the nature of biometrics. The book notes that error
rates in biometric systems lead to a situation where entitled data subjects will
be falsely rejected from the process of database matching. This will adversely
“The error rates imply also that the system will allow
impostors. This is equally important because the security of
biometric systems should be questioned in case of high false
accept rates. This element should be given sufficient weight
in the decision to implement a biometric system for security
purposes…
359
PART H
The book underlines the risk inherent in the limited accuracy of biometrics.478
Tech Tools Profile, Police, and Punish the Poor”479, authored by Virginia
Eubanks, deals with the impact of data mining, policy algorithms, and
services in the USA through three case studies relating to welfare provision,
areas in three different parts of the United States: Indiana, Los Angeles and
benefits and the problems it causes. The author records that in Indiana, one
million applications for health care, food stamps, and cash benefits in three
Statistics are used to predict which children might be future victims of abuse
360
PART H
or neglect. Eubanks shows how algorithms have taken over for human
required to go if they could not support themselves. 480 People who could not
support themselves (and their families) were put up for bid at public auction.
The person who got the contract (which was for a specific time-frame) got the
use of the labour of the poor individual(s) for free in return for feeding,
clothing, housing and providing health care for the individual and his/her
family. The practice was a form of indentured servitude and hardly had any
480 Tommy L. Gardner, Spending Your Way to the Poorhouse, Authorhouse (2004), at page 221
361
PART H
does not act as a facilitator for welfare schemes for the poor and only acts as
a gatekeeper:
481 Virginia Eubanks, Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor, St.
Martin's Press (2018), at pages 12-13
482 Ibid, at page 16
483 Ibid, at pages 81-82
362
PART H
algorithmic technology and indicates that the system, which was intended to
provide assistance for the short term and help people out of poverty, has
363
PART H
violation of dignity. If any such project has to survive, then it has to be ensured
Committee of UIDAI486, which was of the view that the large magnitude of the
Aadhaar project raised uncertainty about the accuracy of biometrics. 487 The
‘Project Risk’, the overview stated the UID project does face certain risks in its
http://www.prsindia.org/uploads/media/UID/UIDAI%20STRATEGY%20OVERVIEW.pdf
364
PART H
raised by UIDAI ought to have been resolved before the implementation of the
Aadhaar project. Poor connectivity in rural India was a major concern. The
majority of the Indian population lives in rural areas. Even a small percentage
(i) before the implementation of the Aadhaar Act, when biometrics were being
used since 2009; (ii) under the provisions of the Act; and (iii) at the practical
365
PART H
Before the enactment of the Aadhaar Act in 2016, the Standing Committee on
Finance, which examined the NIA Bill, was concerned about the impact of
and benefits was to depend upon Aadhaar based authentication, any error in
schemes for the marginalized. In 2011, the report of the Standing Committee
noted, thus:
discussing the concept of Universal Basic Income (UBI). The Survey, which is
the idea that a just society needs to guarantee to each individual a minimum
income which they can count on, and which provides the necessary material
foundation for a life with access to basic goods and a life of dignity.491 UBI was
https://www.thehinducentre.com/multimedia/archive/03193/Economic_Survey_20_3193543a.pdf, at
page 173
366
PART H
Jan-Dhan Bank Accounts, Aadhaar data and Mobile phones. However, the
problem, it cannot solve the “targeting problem” on its own. The Survey
emphasized the need to build state capacity and that “the state will still have
death.
Aadhaar enrolment process has not been completed and that infrastructure
https://dbtbharat.gov.in/data/om/Office%20Memorandum_Aadhaar.pdf
367
PART H
(i) Departments and Bank Branches may make provisions for IRIS scanners
(iii) In all cases where online authentication is not feasible, the benefit/service
periodically.
The figures from the Economic Survey of India indicate that there are millions
set out in Section 7. Options (i) and (ii) above were to be implemented in
368
PART H
board, not after severe deprivations have been caused by the denial of social
welfare benefits.
by members of civil society, including Reetika Khera and Jean Dreze. Similar
civil society activists. Hearing the voices of civil society must be an integral
depend on its own personnel who may not always provide reliable and candid
installing a Point of Sale (PoS) machine equipped with a fingerprint reader and
495Reetika Khera, Impact of Aadhaar on Welfare Programmes, Economic & Political Weekly, Vol. 52 (16
December 2017), available at https://www.epw.in/journal/2017/50/special-articles/impact-aadhaar-welfare-
programmes.html
496Jean Dreze, Dark clouds over the PDS, The Hindu (10 September 2016), available at
https://www.thehindu.com/opinion/lead/Dark-clouds-over-the-PDS/article14631030.ece
497 Anmol Somanchi, Srujana Bej, and Mrityunjay Pandey, Well Done ABBA? Aadhaar and the Public Distribution
System in Hyderabad, Economic & Political Weekly (18 February 2017), Vol. 52, available at
https://www.epw.in/journal/2017/7/web-exclusives/well-done-abba.html
369
PART H
beneficiary and access the PDS system only if her Aadhaar number is
correctly seeded onto the PDS database and added to the household
ration card;
(b) Point of Sale (PoS) machines: The process at the PDS outlet is
made. The first step in the process requires the dealer to enter the ration
(d) Remote Aadhaar servers: Remote Aadhaar servers verify the ration card
the PoS machine indicates that the beneficiary is genuine and that
The above procedure requires that at the time of purchase of PDS grains each
month, any one person listed on the ration card needs to authenticate
370
PART H
recognition) needs to work for a person to get their entitlement.498 Dreze has
India”499. Network failures and other glitches routinely disable this sort of
technology. Dreze has further observed that in villages with poor connectivity,
subsidised grains indicated that technical deficiencies are depriving the poor
of their access to food. The study was commissioned by the state government
after it was found that 22% of the PDS beneficiaries did not take the ration in
the month of May 2015. The sample study, which covered five PDS outlets in
three districts, found that half of the beneficiaries of PDS in the surveyed
areas could not access their ration quota due to glitches, lack of training and
498
Reetika Khera, Impact of Aadhaar on Welfare Programmes, Economic & Political Weekly, Vol. 52 (16
December 2017), available at https://www.epw.in/journal/2017/50/special-articles/impact-aadhaar-welfare-
programmes.html
499Jean Dreze, Dark clouds over the PDS, The Hindu (10 September 2016), available at
https://www.thehindu.com/opinion/lead/Dark-clouds-over-the-PDS/article14631030.ece
500Ibid
501Society for Social Audit, Accountability and Transparency, FP Shops Left Over Beneficiaries Report, available
at
http://www.socialaudit.ap.gov.in/SocialAudit/LoadDocument?docName=Fair%20Price%20Work%20%20Shops
%20(Ration%20Card%20Holders)%20-%20Beneficiaries%20Report.pdf&type=application. See also Aadhaar-
based projects failing the poor, says Andhra govt study, Hindustan Times (7 October 2015), available at
https://www.hindustantimes.com/india/aadhaar-based-projects-failing-the-poor-says-andhra-govt-study/story-
7MFBCeJcfl85Lc5zztON6L.html
371
PART H
numbers did not match with ration card numbers in many cases.
System (PDS) for food grains are failing to realise their right to food. The
benefits. The article notes the impact of PDS on the lives of the rural poor,
who visit the ration shop every month. In “their fragile and uncertain lives”, the
PDS provides a “modicum of food and economic security”. The article notes
that in ABBA, the failure of authentication results in denial of food from ration
shops. The household is unable to get food rations for no fault of its own. The
502Anmol Somanchi, Srujana Bej, and Mrityunjay Pandey, Well Done ABBA? Aadhaar and the Public Distribution
System in Hyderabad, Economic & Political Weekly, Vol. 52 (18 February 2017), available at
https://www.epw.in/journal/2017/7/web-exclusives/well-done-abba.html
503Jean Drèze, Nazar Khalid, Reetika Khera, and Anmol Somanchi, Aadhaar and Food Security in Jharkhand:
Pain without Gain?, Economic & Political Weekly, Vol. 52 (16 December 2017).
372
PART H
article comes to the conclusion that the imposition of ABBA on the PDS in
exclusion (particularly for vulnerable groups such as widows, the elderly and
manual workers). The article further notes that ABBA has neither failed to
PDS in Jharkhand, such as the problem of missing names in ration cards, the
The article regards the denial of basic services to the poor due to failure of
504 Ibid, at page 51. The article states: “[PoS] is a handheld device installed at every PDS outlet (“ration shop”)
and connected to the Internet. The list of ration cards attached to that outlet, and their respective entitlements,
are stored in the PoS machine and updated every month. When a cardholder turns ups, the PoS machine first
“authenticates” her by matching her fingerprints with the biometric data stored against her Aadhaar number in
the Central Identities Data Repository (CIDR). The machine then generates a receipt with the person’s
entitlements, which are also audible from a recorded message... The transaction details are also supposed to
be entered by the dealer in the person’s ration card.”
505 Ibid, at page 55
373
PART H
Jharkhand and 37% in Rajasthan. Those at the receiving end are the poorest
of the poor.
schemes (primarily in MGNREGA, PDS and social security pensions). 507 The
author also discusses briefly the impact of Aadhaar on liquefied petroleum gas
(LPG) subsidy and the application of Aadhaar in the mid-day meal (MDM)
scheme. In coming to its conclusions, the article has relied upon quantitative
data from primary field studies, secondary data from government portals,
figures obtained through queries made under the Right to Information (RTI)
506Ibid, at page 58
507 Reetika Khera, Impact of Aadhaar on Welfare Programmes, Economic & Political Weekly, Vol. 52 (16
December 2017), available at https://www.epw.in/journal/2017/50/special-articles/impact-aadhaar-welfare-
programmes.html
374
PART H
Puja Awasthi documents the plight of individuals suffering from leprosy, who
have been denied pensions due to not being able to get enrolled into the
These writings show how in most cases, an authentication failure means that
programme for no fault of their own. Some have gone hungry. Some
375
PART H
269 A person’s biometrics change over time. For persons, who are engaged
in manual labour, and persons who are disabled or aged, fingerprints actually
cannot be captured by biometric devices. The material which has been relied
exist serious issues of financial exclusion. Pensions for the aged particularly
in cases where a pension is earned for past service – are not charity or doles.
time and age obliterate fingerprints. Hard manual labour severely impacts
upon fingerprints. The elderly, the disabled and the young are the most
deprivation of the right to life. Should the scholarship of a girl child or a mid-
day meal for the young be made to depend on the uncertainties of biometric
matches? Our quest for technology should not be oblivious to the country’s
Aadhaar project suffers from crucial design flaws which impact upon its
compliant with structural due process, to be in accord with Articles 14 and 21.
The Aadhaar project has failed to account for and remedy the flaws in its
framework and design which lead to serious issues of exclusion. Dignity and
376
PART H
projects at the macro level. Structural due process requires that the delivery
of social welfare benefits must be effective and timely. Those who are eligible
for the benefits must not face exclusion. Procedures for the disbursal of
those who disburse and by those who receive the benefits. Deployment of
of the coverage area and the prevailing levels of literacy and awareness.
Above all, the design of the project will be compliant with structural due
and places the burden of ensuring that the benefits reach the marginalised on
271 Section 139AA of the Income Tax Act 1961 which was inserted by the
Finance Act 2017, mandates the quoting of an Aadhaar number in the application
for a Permanent Account Number (PAN) and in the return of income tax. Failure
retrospectively.
377
PART H
the constitutional validity of Section 139AA. Since the issue of whether privacy
judges (the decision in Puttaswamy was still to be delivered), the two judge
378
PART H
Bench did not dwell on the challenge to the legislation on the ground of
privacy and under Article 21. The Bench examined other submissions based
(i) The legislative competence of the law-making body which has enacted
(ii) Compliance with Part III of the Constitution, which enunciates the
Holding that a third ground of challenge – that the law in question is arbitrary –
379
PART H
In Binoy Viswam, the two judge Bench observed that the “contours” of
judicial review had been spelt out in State of Madhya Pradesh v Rakesh
and Justice Uday U Lalit noticed that the dictum in McDowell, to the effect
Ajay Hasia v Khalid Mujib Sehravardi (“Ajay Hasia”),518 and a three judge
In Ajay Hasia, the Constitution Bench traced the evolution of the doctrine of
equality beyond its origins in the doctrine of classification. Ajay Hasia ruled
that since the decision in E P Royappa v State of Tamil Nadu,520 it had been
held that equality had a substantive content which, simply put, was the
380
PART H
The principle of arbitrariness was applied for invalidating a State law by the
three judge Bench decision in Lakshmanan. It was, in this context that Justice
Nariman speaking for two Judges in the Constitution Bench in Shayara Bano
Justice Nariman has observed that even after McDowell, challenges to the
381
PART H
Karnataka527).
275 In Shayara Bano, Justice Nariman has adverted to the decisions which
have followed McDowell including the two judge Bench decision in Binoy
In the above extract, Justice Nariman has specifically held that the McDowell
binding Constitution Bench view in Ajay Hasia and that of a three judge
382
PART H
follows McDowell. Justice Kurian Joseph, in the course of his decision has
which is challenged on the ground that it violates Article 21 meets both the
held:
383
PART H
277 In Binoy Viswam, the two judge Bench held that while enrolment
under the Aadhaar Act is voluntary, it was legitimately open to the Parliament,
while enacting Section 139AA of the Income Tax Act to make the seeding of
the Aadhaar number with the PAN card mandatory. The court held that the
purpose of making it mandatory under the Income Tax Act was to curb black
and its legislative competence could not be questioned on that ground. The
court held that the legislative purpose of unearthing black money and curbing
384
PART H
The court observed that it was a harsh reality of our times that the benefit of
welfare measures adopted by the State does not reach the segments of
385
PART H
exercises, 11.35 lakh cases of duplicate PANs / fraudulent PANs had been
detected out of which 10.52 lakh cases pertained to individual assesses. The
PANs with Aadhaar as “the best method, and the only robust method of de-
278 The edifice of Section 139AA is based on the structure created by the
Aadhaar Act. Section 139AA of the Income Tax Act 1962 is postulated on the
dependent upon and cannot be segregated from the validity of the parent
Aadhaar legislation. In fact, that is one of the reasons why in Binoy Viswam,
the Article 21 challenge was not adjudicated upon since that was pending
under Section 139AA must therefore depend upon the constitutional validity of
the Aadhaar Act as it is determined by this Court. Further Rule 114B of the
386
PART H
Income Tax Rules 1962 provides for a list of transactions for which a person
must quote a PAN card number. Rule 114B requires that a person must
possess a PAN card for those transactions. These are summarized below:
387
PART H
of the revenue to curb tax evasion, by embarking upon a programme for de-
duplication of the Pan data base. A legitimate state aim does exist. However,
388
PART H
that in itself is not sufficient to uphold the validity of the law, which must meet
legislation. The seeding of Aadhaar with Pan cards must depend for its validity
legitimate state aim, the decision of this Court in regard to the validity of
Aadhaar will impact upon the seeding of PAN with Aadhaar, which Section
Court dealt with a public interest litigation seeking to highlight the non-
of TRAI and DoT. The court mandated that the following issues should be
389
PART H
service across all licenced service areas for issuance of mobile connections.
However, it was stated that the e-KYC process was an alternative, in addition
390
PART H
280 A public interest litigation was filed before this Court under Article 32 in
Lokniti Foundation v Union of India535. The relief which claimed was that
Union Government informed this Court that DoT had launched an Aadhaar
within one year. In view of the statement of the AG, the petition was disposed
licensees stating that a way forward had been found to implement the
directions of the Supreme Court. Based on the hypothesis that this Court had
2017.
391
PART H
UIDAI and the State of Gujarat supported the measure. He submitted that the
licences of all TSPs are issued under Section 4 of the Indian Telegraph Act
operate the telegraph under a license and the Central Government is entitled
March 2017 has, it is urged, the sanction of Section 4 of the Indian Telegraph
Act 1885.
282 We must at the outset note the ambit of the proceedings before this
was the Union Government which relied on its decision of 16 August 2016 to
disposed of since the prayers were substantially dealt with and the court
whether the seeding of Aadhaar with mobile SIM cards was constitutionally
283 The decision to link Aadhaar numbers with SIM cards and to require e-
KYC authentication of mobile subscribers has been looked upon by the Union
392
PART H
dated 6 January 2016 states that the new procedure for subscriber verification
which it had adopted was “cumbersome and resource intensive”. The issue as
the privacy of mobile subscribers did not enter into the decision making
meets the test of not being disproportionate or excessive to the legitimate aim
which the state seeks to pursue. TRAI and DoT do have a legitimate concern
over the existence of SIM cards obtained against identities which are not
genuine. But the real issue is whether the linking of Aadhaar cards is the least
verification. The state cannot be oblivious to the need to protect privacy and of
commercial gain. While asserting the need for proper verification, the state
biometric data and the privacy of mobile phone subscribers. Nor can we
accept the argument that cell phone data is so universal that one can become
393
PART H
284 The submission that a direction of this nature could have been given to
TSPs under Section 4 of the Indian Telegraph Act 1885 does not answer the
basic issue of its constitutional validity, which turns upon the proportionality of
the measure. Having due regard to the test of proportionality which has been
find that the decision to link Aadhaar numbers with mobile SIM cards is valid
or constitutional. The mere existence of a legitimate state aim will not justify
the means which are adopted. Ends do not justify means, at least as a matter
285 Mobile technology has become a ubiquitous feature of our age. Mobile
individual choices. They bear upon family life, the workplace and personal
intimacies. The conflation of biometric data with SIM cards is replete with
authentication clearly does not pass constitutional muster and must stand
invalidated. All TSPs shall be directed by the Union government and by TRAI
to forthwith delete the biometric data and Aadhaar details of all subscribers
394
PART I
within two weeks. The above data and Aadhaar details shall not be used or
purveyed by any TSP or any other person or agency on their behalf for any
purpose whatsoever.
threat to financial systems and to the integrity and sovereignty of nations. The
“Introduction
Money-laundering poses a serious threat not only to the
financial systems of countries, but also to their integrity and
sovereignty. To obviate such threats international community
has taken some initiatives. It has been felt that to prevent
money-laundering and connected activities a comprehensive
legislation is urgently needed. To achieve this objective the
Prevention of Money-laundering Bill, 1998 was introduced in
the Parliament. The Bill was referred to the Standing
Committee on Finance, which presented its report on 4th
March 1999 to the Lok Sabha. The Central Government
broadly accepted the recommendation of the Standing
Committee and incorporated them in the said Bill along with
some other desired changes.
395
PART I
are defined respectively in clauses (fa), (wa) and (n) of the Act thus:
396
PART I
397
PART I
follows:
288 Rule 9 of the 2005 Rules requires every reporting entity to carry out
owner, who then has to be identified. Rule 9(3) defines the expression
individual client to submit an Aadhaar number. Rule 9(3) and Rule 9(4) are
extracted below:
398
PART I
399
PART I
result in the account ceasing to be operational until the Aadhaar number and
400
PART I
289 The statutory mandate for the framing these rules is contained in
provides as follows:
401
PART I
records and to verify the identity of their clients and beneficial owners in the
The rule making power is referable to the provisions of Section 73, which
Section 12(1)(c) requires the reporting entity to verify the identity of its clients
“in such manner and subject to such conditions” as may be prescribed. The
402
PART I
challenged on the ground that they suffer from the vice of excessive
delegation.
Group537, this Court has re-affirmed the well-settled legal test which
policy and of formally enacting it into a binding rule of conduct. Once this is
delegated. Having laid down legislative policy, the legislation may confer
discretion on the executive to work out the details in the exercise of the rule
291 The Reserve Bank of India had issued a Master Circular dated 25
February 2016 in exercise of its statutory powers under Section 35A of the
537 (2006) 3 SCC 434
538 (2007) 13 SCC 673
403
PART I
Banking Regulation Act 1949 (read with Section 56) and Rule 9(14) of the
Following the amendment of the PMLA Rules, the Master Circular of the
which were brought about to the PMLA Rules in 2017 meet the test of
proportionality.
292 In 2005, the Central Government in consultation with the Reserve Bank
Records) Rules 2005 under Section 73 of the parent Act. The expression
‘officially valid document’ was defined in Rule 2(d) in the following terms :
Rule 9(4) required the submission to the reporting entity, where the client is an
404
PART I
Under Rule 9(14), the regulator was empowered to issue guidelines, in terms
to verify the identity of a client, taking into consideration the type of client,
business relationship, and the nature and value of transactions based on the
above rules there were six ‘officially valid documents’ : the passport, driving
licence, Permanent Account Number (PAN) Card, NREGA job card, Voter’s
Identity Card and a letter of UIDAI containing details of name, address and
their option, of one of the six officially valid documents (OVDs) for proof of
identity and address. Rule 3(vi) defined the expression ‘officially valid
405
PART I
Customer due diligence and on-going due diligence were defined thus:
294 Chapter III of the Master Circular provided for regulated entities
Master Circular inter alia specified that customers shall not be required to
furnish additional OVDs if the OVD already submitted, contained both proof of
identity and address. Chapter VI which provided for a due diligence procedure
allowed customers to submit one of the six OVDs for proof of identity and
address. Under Part V of Chapter VI, banks were required to conduct on-
above a threshold. Clause 39 of the Circular provided for a partial freezing and
closure of accounts:
406
PART I
requirements under the Foreign Account Tax Compliance Act (FATCA) and
295 As a result of the amendment to the Rules brought about in 2017, Rule
9(4) mandates that in the case of a client who is an individual, who is eligible
required to be submitted. Under Rule 9(15), the reporting entity at the time of
407
PART I
Aadhaar and to obtain a PAN card does not submit its details while
reserved for submission. Those who already have accounts are required to
Following the amendments to the rules, the Reserve Bank has updated its
Master Circular on 20 April 2018 to bring it into conformity with the amended
rules.
296 In deciding whether the amendment brought about in 2017 to the rules
is valid, it is necessary to bear in mind what has already been set out earlier
test of proportionality?
with a view to curb and deal with money-laundering that the original version of
the Master Circular as well as its updated version impose conditions for initial
408
PART I
and on-going due diligence. The Reserve Bank has introduced several
proportionality. In its submissions, the Union government has dealt only with
excessive to the aim and object of the state. There can be no presumption
that all existing account holders as well as every individual who seeks to open
of the business relationship, the nature and value of the transactions and the
terrorism and laundering risks involved may furnish a basis for distinguishing
between cases and clients. The rules also fail to make a distinction between
409
PART I
a salaried wage earner cannot be termed with the same brush as a high net-
account holder with a highly intrusive norm suffers from manifest arbitrariness.
to verify the entity or its client in such a manner and “subject to such
property under Article 300A. The Union Government has been unable to
discharge the burden of establishing that this was the least intrusive means of
achieving its aim to prevent money-laundering or that its object would have
of Aadhaar numbers with all account based relationships with the reporting
transactions and sources which give rise to reasonable grounds for suspecting
excessive. It fails to meet the test of proportionality and suffers from manifest
arbitrariness. While we have come to the above conclusion, we clarify that this
would not preclude the Union Government in the exercise of its rule making
410
PART J
power and the Reserve Bank of India as the regulator to re-design the
J Savings in Section 59
298 The petitioners have submitted that all acts done pursuant to the
Notifications dated 28 January 2009 and 12 September 2015, under which the
rights and were not supported by the authority of law. It has been submitted
that the collection, storage and use of personal data by the State and private
entities, which was done in a legislative vacuum as the State failed to enact
the Aadhaar Act for six years, is now being sought to be validated by Section
59. It has been contended that since the acts done prior to the enactment of
411
PART J
It has been submitted that a validating law must remove the cause of invalidity
consequence without amending the law from which the consequence could
follow. In the present case, it has been contended, Section 59 does not create
a legal fiction where the Aadhaar Act is deemed to have been in existence
since 2009 and that it only declares a legal consequence of the acts done by
inasmuch as for Aadhaar enrolments done before 2016, there was neither
provided under a legal framework. Section 59, it is contended, cannot cure the
Aadhaar Act, to the enrolments done prior to the enactment of the Act.
299 The respondents have submitted that Section 59 protects the actions
any data base, containing identity information, by the State governments. The
during Aadhaar enrolments before the Act came into force, from their server.
412
PART J
The Respondents have relied upon the judgments of this Court in West
It has also been contended that before the advent of the Aadhaar Act, no
individual has been enrolled under compulsion, and since all enrolments were
whether collection of identity information violates the right to privacy, does not
prevent the Parliament from enacting a validating clause. Reliance has also
that all actions taken under the notifications were taken under the Act.
condition for availing a subsidy, benefit or service for which the expenditure is
incurred from the Consolidated Fund of India. Section 3 provides that the
413
PART J
Section 57 provides that the use of an Aadhaar number under the Section
shall be subject to the procedure and obligations under Section 8 and Chapter
VI of the Act. Section 8 sets out the procedure for authentication. It states that
before collecting identity information and shall ensure that the identity
information for any other purpose. Chapter VI of the Act, which deals with
entities. The Act authorises the use of Aadhaar numbers by the Central
414
PART J
government, state governments and the private entities for establishing the
identity of a resident for any purpose. The Act also contains certain
taken before the enactment of the Aadhaar Act have to be tested upon the
the Central Government prior to the Aadhaar Act, which were done under the
undertaken by the State governments and by private entities are not saved by
Section 59.
UIDAI, while giving it the responsibility of laying down a plan and policies to
implement a unique identity (UID) scheme. UIDAI was only authorized to own
and operate the UID database, with a further responsibility for the updation
notification did not contain any reference to the use of biometrics for the
authority to collect biometrics. Biometrics, finger prints or iris scans were not
within its purview. There was no mention of the safeguards and measures
relating to the persons or entities who would collect biometric data, how the
415
PART J
data would be collected and how it would be used. The website of the Press
Aadhaar Act was notified by the Central government, UIDAI had generated
individuals prior to the enactment of the Aadhaar Act does not fall within the
scope of the 2009 notification. Having failed to specify finger prints and iris
scans in the notification, the validating provision does not extend to the
collection of biometric data before the Act. The 2009 notification did not
biometrics. Since the collection of biometrics was not authorised by the 2009
notification, Section 59 of the Aadhaar Act does not validate these actions.
304 The collection of the biometrics of individuals impacts their privacy and
requires the enacting of a valid law by the legislature.546 The law will be valid
Part III of the Constitution.547 The invasion of any right flowing from privacy
places a heavy onus upon the State to justify its actions. Nine judges of this
545Press Information Bureau, UIDAI generates a billion (100 crore) Aadhaars A Historic Moment for India,
available at http://pib.nic.in/newsite/PrintRelease.aspx?relid=138555
546A Constitution Bench of this Court in State of Madhya Pradesh v. Thakur Bharat Singh (AIR 1967 SC 1170)
held: “All executive action which operates to the prejudice of any person must have the authority of law to
support it… Every Act done by the Government or by its officers must, if it is to operate to the prejudice of any
person, be supported by some legislative authority.”
547Puttaswamy, at para 272
416
PART J
valid law, in this case, would mean a law enacted by Parliament, which is just,
fair and reasonable. Any encroachment upon the fundamental right to privacy
There is also no merit in the submission of the Respondents that prior to the
format of the first two enrolment forms used by UIDAI, under which around 90
crore enrolments were done, had no mention of informed consent or the use
privacy, Puttaswamy requires that the law must have adequate safeguards
for the collection and storage of personal data. Data protection, which is
Aadhaar Act provides certain safeguards in Section 3(2) and Section 8(3) for
with Chapter VII in the form of penalties. The safeguards provided under the
417
PART J
Act were not in existence before the enactment of the Act. The collection of
biometrics after the 2009 notification and prior to the Aadhaar Act suffers from
fundamental right. At the time when the enrolments took place prior to the
extend the safeguards provided under the Act to the enrolments done earlier.
of criminal law that it cannot be applied retrospectively to acts which were not
offences at the time when they took place. Article 20(1) of the Constitution
provides that “No person shall be convicted of any offence except for violation
of the law in force at the time of the commission of the act charged as an
offence”. The application of the criminal provisions of the Act, provided under
Chapter VII of the Act which deals with “Offences and Penalties”, cannot be
305 The Respondents submit that the collection of biometrics prior to the
418
PART J
Section 43A of the Act provides for compensation for failure to protect data:
419
PART J
Section 66E provides for punishment for the violation of the privacy of an
individual:
send a visual image with the intent that it be viewed by a person or persons.
548Section 25, Indian Penal Code states: ““Fraudulently”.—A person is said to do a thing fraudulently if he does
that thing with intent to defraud but not otherwise”
549Section 24, Indian Penal Code states: ““Dishonestly”- Whoever does anything with the intention of causing
wrongful gain to one person or wrongful loss to another person, is said to do that thing “dishonestly”
420
PART J
a lawful contract:
covered under Section 43A. The scope of Section 66E is limited. It only deals
with the privacy of the “private area” of any person. It does not deal with
421
PART J
while providing services under a lawful contract. Section 66C deals with
identity theft and punishes the dishonest or fraudulent use of the unique
Many of the safeguards which were introduced by the Aadhaar Act were not
was the absence of those safeguards in the Information Technology Act which
required their introduction in the Aadhaar Act. Hence, the Attorney General is
safeguards governing biometric data during the period when the Aadhaar
are two distinct facets here. First, the absence of a legislative framework for
the Aadhaar project between 2009 and 2016 left the biometric data of millions
to privacy. Second, the notification of 2009 does not authorise the collection of
biometric data. Consequently, the validation of actions taken under the 2009
notification by Section 59 does not save the collection of biometric data prior
422
PART J
safeguards providing not only penalties for misuse or loss of one’s personal
307 The Respondents have relied upon several judgments where this Court
has upheld validating statutes, which, they contend, are similar to Section 59.
sought to acquire electricity undertakings in the state was struck down for
force, and under the Seventh Schedule, the State acquired legislative
actions done and taken under the 1949 Act. Section 24 provided thus:
validly taken under the provisions of the earlier Act, which was invalid from the
423
PART J
24 thus:
“12. The first part of the section deals, inter alia, with
notifications which have been validly issued under the
relevant provisions of the earlier Act and it means that if
the earlier Act had been valid at the relevant time, it ought to
appear that the notifications in question could have been and
had in fact been made properly under the said Act. In other
words, before any notification can claim the benefit of
Section 24, it must be shown that it was issued properly
under the relevant provisions of the earlier Act, assuming
that the said provisions were themselves valid and in
force at that time. The second part of the section provides
that the notifications covered by the first part are declared by
this Act to have been validly issued; the expression “hereby
declared” clearly means “declared by this Act” and that shows
that the notifications covered by the first part would be treated
as issued under the relevant provisions of the Act and would
be treated as validly issued under the said provisions. The
third part of the section provides that the statutory declaration
about the validity of the issue of the notification would be
subject to this exception that the said notification should not
be inconsistent with or repugnant to the provisions of the Act.
In other words, the effect of this section is that if a
notification had been issued properly under the
provisions of the earlier Act and its validity could not
have been impeached if the said provisions were
themselves valid, it would be deemed to have been
validly issued under the provisions of the Act, provided,
of course, it is not inconsistent with the other provisions
of the Act. The section is not very happily worded, but on its
fair and reasonable construction, there can be no doubt about
its meaning or effect.” (Emphasis supplied)
308 The second decision is a four judge Bench judgment in Chetty, which
private land for public purposes − the Mysore Land Acquisition Act, 1894 and
notification which was issued under the 1894 Act for the acquisition of his land
424
PART J
the Improvement Act were applied. The High Court accepted the contention,
against which there was an appeal to this Court. During the pendency of the
425
PART J
notifications issued or orders made under the Mysore Land Acquisition Act
before the validating law came into force. The Validation Act was challenged
on the ground that it was discriminatory to provide two Acts which prescribed
two different procedures under the acquisition laws in the same field. This
Court found that the legislature retrospectively made a single law for the
“15. If two procedures exist and one is followed and the other
discarded, there may in a given case be found discrimination.
But the Legislature has still the competence to put out of
action retrospectively one of the procedures leaving one
procedure only available, namely, the one followed and thus
to make disappear the discrimination. In this way a Validating
Act can get over discrimination. Where, however, the
legislative competence is not available, the discrimination
must remain for ever, since that discrimination can only be
removed by a legislature having power to create a single
procedure out of two and not by a legislature which has not
that power.”
309 In West Ramnad, the validation depended upon the condition that a
notification or act ought to have been validly issued or done under the earlier
statute, presuming that the earlier Act was itself valid at that time. In the
present case, there was no earlier law governing the actions of the
government for the collection of biometric data. The Aadhaar Act was notified
Information and Technology’s notification of 2015 were not issued under any
426
PART J
310 The decision in Chetty in fact brings out the essential attributes of a
validating law. The existence of two legislations governing the field of land
14 by the High Court (on the basis of the position in law as it then stood).
During the pendency of the appeal before this Court, the legislature enacted a
validating law which removed the cause for invalidity. The reason the state
law had been invalidated by the High Court was the existence of two laws
governing the same field. This defect was removed. To use the words of this
Court, the legislature “put out of action retrospectively one of the procedures”
as a result of which only one procedure was left in the field. The decision in
Chetty thus brings out the true nature of a validating law. A validating law
enactment.
Act, 1958 was challenged on the ground that Section 5(1) contravened Article
14. Section 5(1) conferred power on the Estate Officer to make an order of
427
PART J
premises. During the pendency of the appeal before this Court, the Public
validated all actions taken under the Act of 1958. The constitutional validity of
the 1971 Act was also challenged. Section 20 of the later Act provided:
The Court held that the legislature has the power to validate actions under an
earlier law by removing its infirmities. In that case, validation was achieved by
enacting the 1971 Act with retrospective effect from 1958 and legislating that
actions taken under the earlier law will be deemed to be as valid and effective
as if they were taken under the 1971 Act. The Court held:
“24. The 1958 Act has not been declared by this Court to be
unconstitutional… The arguments on behalf of the appellants
therefore proceeded on the footing that the 1958 Act will be
presumed to be unconstitutional. It was therefore said that the
1971 Act could not validate actions done under the 1958 Act.
The answer is for the reasons indicated above that the
Legislature was competent to enact this legislation in 1958
and the Legislature by the 1971 Act has given the legislation
full retrospective operation. The Legislature has power to
validate actions under an earlier Act by removing the
infirmities of the earlier Act. The 1971 Act has achieved that
object of validation.”
428
PART J
undertaken under the previous Act, which had been invalidated by a court
decision. The validating law of 1971 was enacted with retrospective effect
from 1958.
Court in Jaora Sugar Mills (P) Ltd. v State of Madhya Pradesh550 (Jaora
Sugar Mills), SKG Sugar Ltd. v State of Bihar551 (“SKG Sugar”) and
enactment was struck down for violating Article 265 or the fundamental
rights, of a citizen, validating Acts were enacted after removing the flaw and
that in cases where the state Legislature was held to be incompetent to enact
substantive provision.
429
PART J
313 In Jaora Sugar Mills, a state law imposing cess was struck down for
(Validation) Act, 1961 to validate the imposition of cess under the invalidated
The Section was upheld. Speaking for the Constitution Bench, Chief Justice
Gajendragadkar held:
The state law was held to be invalid for want of legislative competence.
Parliament, which was competent to enact a law on the subject, did so with
retrospective effect and validated actions which were taken under the invalid
state law.
430
PART J
314 In SKG Sugar, a state law - Bihar Sugar Factories Control Act, 1937 -
315 In Krishna Chandra, provisions of the Bihar Land Reforms Act, 1950
were struck down for want of legislative competence. Parliament enacted the
Mines and Minerals (Regulation and Development) Act, 1957 to validate those
431
PART J
The central issue in the case was whether a statute and a rule earlier
fresh validating legislation by the competent Legislature. The Court held that it
could be.
316 Section 59 of the Aadhaar Act is different from the validating provisions
in Jaora Sugar Mills, SKG Sugar and Krishna Chandra. In those cases,
state laws were invalid for want of legislative competence. Parliament, which
retrospective effect and protect actions taken under the state law. The
infirmity being that the earlier laws were void for absence of competence in
the legislature, the fresh laws cured the defect of the absence of legislative
competence.
432
PART J
317 Parliament and the State Legislatures have plenary power to legislate
plenary because the legislature can legislate with prospective as well as with
invalidated, it is open to the legislature to remove the defect. While doing that,
the legislature can validate administrative acts or decisions made under the
invalid law in the past. The true test of a validation is that it must remove the
defects in the earlier law. It is not enough for the validating law to state that
the grounds of invalidity of the earlier law are deemed to have been removed.
The validating law must remove the deficiencies. There were several
deficiencies in the collection of biometric data during the period between 2009
and 2016, before the Aadhaar Act came into force. The first was the absence
information took place without the authority of law. Second, the notification of
2009 did not authorize the collection of biometric data. Third, the collection of
biometric data was without an enabling framework of the nature which the
Aadhaar Act put into place with effect from 2016. The Aadhaar Act introduced
information collected from citizens, penalties and offences for breach and
regulated the uses to which the data which was collected could be put. In the
433
PART J
318 Section 59 does not remove the cause for invalidity. First, Section 59
protects actions taken under the notification of 2009. The notification does not
provide legal authority for the collection of biometrics between 2009 and 2016.
Second, it was through the Aadhaar Act, that safeguards were sought to be
collected, restrictions on the use of the data and through a regime of penalties
and offences for violation. Section 59 does not cure the absence of these
safeguards between 2009 and 2016. Section 59 fails to meet the test of a
validating law for the simple reason that the absence of safeguards and of a
regulatory framework is not cured merely by validating what was done under
the notifications of 2009 and 2016. There can be no dispute about the
right. But in order to do so, it is necessary to cure the basis or the foundation
on which there was a violation of the fundamental right. The deficiency must
which the collection of biometric data took place before the enforcement of the
434
PART J
319 A Constitution Bench of this Court held that by virtue of Section 58, all
things done and actions taken under the repealed ordinance are deemed to
if that Act were in force on the day on which that thing was done or action was
taken. The things done or actions taken under the repealed ordinance are to
be deemed by fiction to have been done or taken under the repealing Act. The
actions were validated because the Act, in this case, was deemed to be “in
force on the day on which such thing was done or action was taken”. Section
59 of the Aadhaar Act does not create this fiction. The Aadhaar Act does not
come in force on the date on which the actions, which this Section seeks to
320 A three judge Bench headed by one of us, Hon’ble Mr Justice Dipak
Misra (as the learned Chief Justice then was) in State of Karnataka v State
435
PART J
of Tamil Nadu557, was dealing with a batch of civil appeals filed against a final
order of the Cauvery Water Disputes Tribunal constituted under the Inter-
State River Water Disputes Act, 1956. Section 6(2) of the 1956 Act provides:
Relying on Section 6(2), it was contended that the jurisdiction of this Court is
ousted as it cannot sit in appeal on its own decree. The Court did not accept
The judgment makes it clear that a deeming fiction cannot travel beyond what
436
PART J
create a deeming fiction that all the actions taken under the notifications
issued were done under the Act and not under the aforesaid notifications.
321 This Court must also deal with the Respondents’ submission that
Parliament is not debarred from enacting a validation law even though the
Court did not have the opportunity to rule on the validity of the notifications
employees. The issue before the Court was whether the Orissa Act was in
Act or rule in existence. The Court held that since the Orissa Act merely
a validating law. It was held the legislation did not validate any such non-
437
PART J
322 The two judge Bench relied upon the Constitution Bench decision of
These judgments suggest that while there can be no disagreement with the
proposition that a legislature has the power, within its competence, to make a
law to validate a defective law, the validity of such a law would depend upon
438
PART K
determination. But that law should cure the cause of infirmity or invalidity.
Section 59 fails to cure the cause of invalidity prior to the enactment of the
Aadhaar Act.
323 The rule of law is the cornerstone of modern democratic societies and
power. It also assumes the generality of law: the individual's protection from
arbitrary power consists in the fact that her personal dealings with the State
are regulated by general rules, binding on private citizens and public officials
alike.564
the State. Separation of power supports the accountability aspect of the rule of
the rule of law. By entrusting the power of judicial review to courts, the
doctrine prevents government officials from having the last word on whether
439
PART K
324 The concepts of the rule of law and separation of powers have been
integral to Indian constitutional discourse. While both these concepts have not
immense attention from this Court in its judgments. Though the Indian
sense, the following statement of the law by Chief Justice Mukherjea in Ram
has a direct link with the preservation of institutional rectitude and individual
565Denise Meyerson, The Rule of Law and the Separation of Powers (2004), available at
http://www5.austlii.edu.au/au/journals/MqLJ/2004/1.html
566 (1955) 2 SCR 225
567 (1967) 2 SCR 703
440
PART K
The separation of powers between the legislature, the executive and the
Justice HR Khanna held that the rule of law meant “supremacy of the
Gandhi v Shri Raj Narain572, Chief Justice AN Ray held the rule of law to be
SCC 640]; I .R. Coelho (Dead) by L.Rs. v. State of Tamil Nadu, (2007) 2 SCC 1.
572 1975 Supp SCC 1
441
PART K
The functional relationship between separation of powers and the rule of law
involves determination not only of the constitutionality of law but also of the
Bench held that irrespective of “whether or not there is distinct and rigid
separation of powers under the Indian Constitution”, the judicature has been
442
PART K
326 Judicial review has been held to be one of the basic features of the
443
PART K
The complementary relationship between judicial review, the rule of law and
values of the Constitution and the rule of law. This Court took note of this
aspect in Puttaswamy:
as much as its text. This role has exclusively been conferred on the Supreme
Court and the High Courts to ensure that its values are not diminished by the
444
PART K
legislature or the executive. Our Court has been conscious of this role. In
Krishna Kumar Singh v State of Bihar582, while dealing with the question
can bring about consequences for the future (in terms of the creation of rights,
privileges, liabilities and obligations) which will enure beyond its life, a seven
The Court held that the ordinance making power must be carefully structured
to ensure that it remains what the framers of our Constitution intended it to be:
answerable for its decisions and actions while in public office. 584 A
http://www.proconservative.net/CUNAPolSci201PartTWOA.shtml
445
PART K
political authority among the major organs or parts of the government. The
limits of each institution are set by the Constitution. No institution which has
check and balance among the institutions and promotes the rule of law by
that every institution acts within its limits. Judicial review promotes
Constitution. Not only are the organs of the State required to operate within
their defined legitimate spheres; they are bound to exercise their powers
585In Sheela Barse v. State of Maharashtra ((1983) 2 SCC 96), the Supreme Court insisted on fairness to women
in police lock-up and also drafted a code of guidelines for the protection of prisoners in police custody,
especially female prisoners. In Veena Sethi v. State of Bihar (AIR 1982 S.C. 1470), the Supreme Court
extended the reach of rule of law to the poor who constitute the bulk of India by ruling that rule of law does not
merely for those who have the means to fight for their rights and expanded the locus standi principle to help the
poor
586Durga Das Basu, Limited Government and Judicial Review, LexisNexis, (2016) at pages 123-124
446
PART K
This formulation of the limited power of political authority has been recognized
held:
447
PART K
330 In I R Coelho v State of Tamil Nadu590, a nine judge Bench held that
constitutional democracy.591
Interim directions issued on the basis of the prima facie findings in a case are
448
PART K
temporary arrangements till the matter is finally decided. Interim orders ensure
that the cause which is being agitated does not become infructuous before the
final hearing.592 The power of judicial review is not only about the writs issued
complied with. Unless orders are enforced, citizens will lose faith in the
It is in the background of the above constitutional position that this Court must
deal with the contention that the interim orders passed by this Court, during
the adjudication of the present dispute were not observed. This Court has
mandatory use of Aadhaar. It has been submitted that the interim orders have
been violated and several contempt petitions are pending593 before this Court.
332 Prior to the enactment of the Aadhaar Act, the scheme was challenged
before this Court. By its interim order dated 23 September 2013 594, a two
“All the matters require to be heard finally. List all matters for
final hearing after the Constitution Bench is over.
In the meanwhile, no person should suffer for not getting
the Aadhaar card in spite of the fact that some authority
had issued a circular making it mandatory and when any
person applies to get the Aadhaar Card voluntarily, it
may be checked whether that person is entitled for it
449
PART K
This was followed by an order dated 26 November 2013 where the earlier
“After hearing the matter at length, we are of the view that all
the States and Union Territories have to be impleaded as
respondents to give effective directions. In view thereof notice
be issued to all the States and Union Territories through
standing counsel…
Interim order to continue, in the meantime.”
On 16 March 2015, while considering WP (Civil) 494 of 2012, this Court noted
a violation of its earlier order dated 23 September 2013 and directed thus:
450
PART K
that both the Union of India and States and all their
functionaries should adhere to the Order passed by this
Court on 23rd September, 2013.”
By an order dated 11 August 2015, a three judge Bench referred the issue as
451
PART K
After the Aadhaar Act was enacted there was a challenge in All Bengal
It has been submitted that the notifications and circulars, which make the
by this Court. It has been contended that the Respondents have flouted the
452
PART K
333 The legislature cannot simply declare that the judgment of a court is
India598:
453
PART K
When the Aadhaar Act was notified on 25 March 2016, the interim directions
until death?
The position which the Union government has adopted before this court is
simply this: interim directions were issued by this court when the Aadhaar
334 This defence of government can be scrutinized at two levels – the first
454
PART K
statutory interpretation, the Aadhaar Act did not, as it could not have, merely
nullified the interim orders of this court. Section 59 has no provision which
court. The interim orders do not stand superseded. Apart from approaching
concerns which arise from the manner in which the authorities proceeded,
oblivious to the interim directions. Interim directions were issued by this court
petitions on the ground that the Aadhaar project was offensive to fundamental
rights, including the right to privacy. So significant was the nature of the
of biometric data and its use for the purpose of authentication is the subject of
considering the serious issues which have arisen in the case, successive
those directions is that Aadhaar could not be made mandatory except for
specified schemes which were listed by the court. Moreover, in the context of
not obviated merely on the enactment of the Aadhaar Act. The law gave a
455
PART K
addressed by the court. The proceedings before this Court are testimony to
the fact that the issue of constitutionality was indeed live. That being the
of the interim orders passed by this Court. Judicial orders, be they interim or
to ignore judicially enforceable directions, that would negate the basis of the
rule of law. Both propriety and constitutional duty required Union government
to move this Court after the enactment of the Aadhaar Act for variation of the
interim orders. Such an application would have required this Court to weigh
on the one hand the subsequent development of the law being passed
concerns over the entire biometric project. It is not as if that the mere
enactment of the law put an end to the constitutional challenge. The existence
of law (post 2016) is only one aspect to be considered in deciding the interim
arrangement which would hold the field when the constitutional challenge was
orders. What seems to emerge from the course of action which has been
456
PART K
the fact that this construction is erroneous in law, it is above all, the
fundamental duty of this Court to ensure that its orders are not treated with
obligation to comply with judicial orders is universal to our polity and admits of
requires that other organs of the State respect the authority of Courts. This
the importance of judicial review in the rule of law regime, held thus:
457
PART K
336 A Bench of two judges in Re: Arundhati Roy602 held that for the courts
to protect the rule of law, it is necessary that the dignity and authority of the
the power vested in any organ of the State, and its agents, can only be used
may only be exercised in accordance with written laws which are adopted
courts.
458
PART K
requires that the orders of this Court be complied with, faithfully. This Court is
the ultimate custodian of the Constitution. The limits set by the Constitution
are enforced by this Court. Constitutional morality requires that the faith of the
“But there is one way in this country in which all men are
created equal—there is one human institution that makes a
pauper the equal of a Rockefeller, the stupid man the equal of
an Einstein, and the ignorant man the equal of any college
president. That institution, gentlemen, is a court. It can be
the Supreme Court of the United States or the humblest J.P.
court in the land, or this honorable court which you serve. Our
courts have their faults, as does any human institution, but in
this country our courts are the great levelers, and in our
courts all men are created equal.” (Emphasis supplied)
Many citizens, although aggrieved, are not in a condition to reach the highest
Court. The poorest and socially neglected lack resources and awareness to
suffer injury each day without remedy. Disobedience of the interim orders of
this Court and its institutional authority, in the present case, has made a
societal impact. It has also resulted in denial of subsidies and other benefits
459
PART K
must neutralise the excesses of power by the executive. The brazen manner
the interim order of this Court is a matter of serious concern. Deference to the
institutional authority of the Supreme Court is integral to the values which the
role of the Supreme Court in protecting the liberties of citizens and holding
and survives. The orders of the Court are not recommendatory – they are
prestige of this Court can only be at the cost of endangering the freedom of
338 Courts – as it is often said- have neither the power of the purse nor the
the Court. That sense of legitimacy and duty have required me to assert once
again the norms of a written Constitution and the rule of law. This judgment
has taken a much wider postulation. Having held the Aadhaar Act prior to its
passage not to be a Money Bill, I have delved into the merits of the
460
PART L
i. Merits have been argued in considerable detail both by petitioners and the
ii. As a logical consequence of the view that the Aadhaar legislation is not a
L Conclusion
339 The present dispute has required this Court to analyze the provisions of
the Aadhaar Act and Regulations, along with the framework as it existed prior
to the enactment of the Act, through the prism of the Constitution and the
(1) In order to deal with the challenge that the Aadhaar Act should not have
whether the decision of the Speaker of the Lok Sabha to certify a Bill as a
Money Bill, can be subject to judicial review. The judgment has analyzed
461
PART L
(a) The phrase “shall be final” used under Article 110(3) aims at avoiding
respect to the Rajya Sabha and before the President. The language
used in Article 110(3) does not exclude judicial review of the Speaker’s
Reference, Ramdas Athawale and Raja Ram Pal hold that the validity
(c) Article 255 has no relation with the decision of the Speaker on whether
a Bill is a Money Bill. The three Judge Bench decision in Mohd Saeed
apply Articles 212 (or Article 122) and 255 to refrain from questioning
the conduct of the Speaker (under Article 199 or 110). The two judge
462
PART L
The correct position of law is that the decision of the Speaker under
Articles 110(3) and 199(3) is not immune from judicial review. The
accordingly overruled.
(d) The existence of and the role of the Rajya Sabha, as an institution of
Lok Sabha to certify a Bill as a Money Bill has a direct impact on the
role of the Rajya Sabha, since the latter has a limited role in the passing
an ordinary Bill to be a Money Bill limits the role of the Rajya Sabha.
Constitution.
(2) To be certified a Money Bill, a Bill must contain “only provisions” dealing
with every or any one of the matters set out in sub-clauses (a) to (g) of
Article 110(1). A Bill, which has both provisions which fall within sub-
clauses (a) to (g) of Article 110(1) and provisions which fall outside their
463
PART L
scope, will not qualify to be a Money Bill. Thus, when a Bill which has
been passed as a Money Bill has certain provisions which fall beyond the
be severed. If the bill was not a Money Bill, the role of the Rajya Sabha in
its legislative passage could not have been denuded. The debasement of
(3) The Aadhaar Act creates a statutory framework for obtaining a unique
identity number, which is capable of being used for “any” purpose, among
which availing benefits, subsidies and services, for which expenses are
incurred from the Consolidated Fund of India, is just one purpose provided
under Section 7. Clause (e) of Article 110(1) requires that a Money Bill
provisions other than Section 7 of the Act deal with several aspects
464
PART L
disclosure or loss of information, and the use of the Aadhaar number for
“any purpose”. All these provisions of the Aadhaar Act do not lie within the
from the Consolidated Fund of India, the other provisions of the Act fail to
fall within the domain of Article 110(1). Thus, the Aadhaar Act is declared
(4) The argument that the Aadhaar Act is in pith and substance a Money Bill,
with its main objective being the delivery of subsidies, benefits and
services flowing out of the Consolidated Fund of India and that the other
provisions are ancillary to the main purpose of the Act also holds no
whether the legislature has the competence to enact a law with regard to
any of the three Lists in the Seventh Schedule of the Constitution. The
Money Bill. The argument of the Union of India misses the point that a Bill
465
PART L
can be certified as a Money Bill “only” if it deals with all or any of the
(5) Having held that the Aadhaar Act is unconstitutional for having been
passed as a Money Bill this judgment has also analysed the merits of the
(6) The architecture of the Aadhaar Act seeks to create a unique identity for
the fulfilment of social welfare schemes and programmes, which are a part
of the State’s attempts to ensure that its citizens have access to basic
466
PART L
about them, the unique nature of biometric data distinguishes it from other
biometric system. Adequate norms must be laid down for each step from
purpose of the collection, the reason why the particular data set is
requested and who will have access to their data. Additionally, the
retention period must be justified and individuals must be given the right to
access, correct and delete their data at any point in time, a procedure
(8) Prior to the enactment of the Aadhaar Act, no mandatory obligation was
them how the biometric data would be stored and used and about the
the enactment of the Act, while UIDAI had itself contemplated that an
identity theft could occur at the time of enrollment for Aadhaar cards, it
467
PART L
had no solution to the possible harms which could result after the identity
theft of a person.
(9) The Regulations framed subsequently under the Aadhaar Act also do not
from residents before collecting their biometric data. The Aadhaar Act and
Aadhaar Act clearly has no defined options that should be made available
to the Aadhaar number holders in case they do not wish to submit identity
(10) Sections 29(1) and (2) of the Act create a distinction between two classes
(11) Sections 2(g), (j), (k) and (t) suffer from overbreadth, as these can lead to
468
PART L
also collecting any “such other biological attributes” that it may deem fit.
the data stored in CIDR. The proviso to Section 28(5) of the Aadhaar Act,
principle that ownership of an individual’s data must at all times vest with
Act as well as a detailed analysis of the provisions under the Aadhaar Act,
2016 and supporting Regulations made under it, this judgment concludes
These authentication failures have led to the denial of rights and legal
469
PART L
entitlements. The Aadhaar project has failed to account for and remedy
the flaws in its framework and design which has led to serious instances
2016-17 and research studies. Dignity and the rights of individuals cannot
benefits arising out of any social security scheme which promotes socio-
(14) The violations of fundamental rights resulting from the Aadhaar scheme
(a) Under the Aadhaar project, requesting entities can hold the identity
been admitted by UIDAI that it gets the AUA code, ASA code, unique
device code and the registered device code used for authentication,
and that UIDAI would know from which device the authentication took
470
PART L
purpose for which it has been collected is fulfilled. Moreover, using the
can easily be traced using the IP address, which impacts upon the
the Central Government nor UIDAI have the source code for the de-
licensee. Prior to the enactment of the Aadhaar Act, without the consent
471
PART L
foreign entity which provided the source code for biometric storage) to
This is contrary to the basic requirement that an individual has the right
normal contract.
(d) Before the enactment of the Aadhaar Act, MOUs signed between UIDAI
and Registrars were not contracts within the purview of Article 299 of
the Constitution, and therefore, do not cover the acts done by the
backing.
(e) Under the Aadhaar architecture, UIDAI is the sole authority which
functions of the project. While the Act confers these functions on UIDAI,
472
PART L
stored in the CIDR is correct and authentic. The task has been
being entered in the CIDR is a highly sensitive task for which the UIDAI
ought to have taken responsibility. The Aadhaar Act is also silent on the
(f) Section 47 of the Act violates citizens’ right to seek remedies. Under
their right to privacy. Further, Section 23(2)(s) of the Act requires UIDAI
body.
(g) While the Act creates a regime of criminal offences and penalties, the
Aadhaar ought to have, but has failed to embody within the law the
of regulators), along with the broad principles for data protection. This
have been laid down as guiding principles for the oversight mechanism
security.
(i) Allowing private entities to use Aadhaar numbers, under Section 57, will
cannot be used for any purpose other than those that have been
474
PART L
ought to be addressed. These issues have not been dealt with by the
(k) Section 7 suffers from overbreadth since the broad definitions of the
almost every facet of its engagement with citizens under the Aadhaar
(l) The legitimate aim of the State can be fulfilled by adopting less intrusive
475
PART L
authentication would not subserve its purposes. That the state has
across discreet data silos, which allows anyone with access to this
contrary to the right to privacy and poses severe threats due to potential
surveillance.
(n) One right cannot be taken away at the behest of the other. The State
has failed to satisfy this Court that the targeted delivery of subsidies
which animate the right to life entails a necessary sacrifice of the right
private entities. Moreover, the notification of 2009 did not authorise the
under the 2009 notification by Section 59 does not save the collection of
476
PART L
legislative framework for the Aadhaar project between 2009 and 2016 left
enforce the right to privacy. Section 59 therefore fails to meet the test of
law, which must also meet the other parameters of proportionality spelt out
in Puttaswamy.
(17) The seeding of Aadhaar with PAN cards depends on the constitutional
validity of the Aadhaar legislation itself. Section 139AA of the Income Tax
Act 1962 is based on the premise that the Aadhaar Act itself is a valid
477
PART L
(18) The 2017 amendments to the PMLA Rules fail to satisfy the test of
distinction has been made in the degree of imposition based on the client,
the nature of the business relationship, the nature and value of the
The rules also fail to make a distinction between opening an account and
an Aadhaar number are draconian. In their present form, the rules are
not preclude the Union Government in the exercise of its rule making
power and the Reserve Bank of India as the regulator to re-design the
(19) Mobile phones have become a ubiquitous feature of the lives of people
and the linking of Aadhaar numbers with SIM cards and the requirement of
this light. Applying the proportionality test, the legitimate aim of subscriber
478
PART L
preserving the integrity of biometric data and the privacy of mobile phone
mobile SIM cards is neither valid nor constitutional. The mere existence of
a legitimate state aim will not justify the disproportionate means which
have been adopted in the present case. The biometric information and
(20) Defiance of judicial orders (both interim and final) be it by the government
or by citizens negates the basis of the rule of law. Both propriety and
constitutional duty required the Union government to move this Court after
the enactment of the Aadhaar Act for variation of this Court’s interim
479
PART L
constitutional identity.
(22) The entire Aadhaar programme, since 2009, suffers from constitutional
Aadhaar Act does not save the Aadhaar project. The Aadhaar Act, the
Rules and Regulations framed under it, and the framework prior to the
(23) To enable the government to initiate steps for ensuring conformity with
this judgment, it is directed under Article 142 that the existing data which
has been collected shall not be destroyed for a period of one year. During
this period, the data shall not be used for any purpose whatsoever. At the
end of one year, if no fresh legislation has been enacted by the Union
Creating strong privacy protection laws and instilling safeguards may address
or at the very least assuage some of the concerns associated with the
480
PART L
highlighted in this judgment which would provide a strong foundation for digital
initiatives, which are imminent in today’s digital age. However, in its current
form, the Aadhaar framework does not sufficiently assuage the concerns that
have arisen from the operation of the project which have been discussed in
this judgment.
……....................................................J
[Dr Dhananjaya Y Chandrachud]
New Delhi;
September 26, 2018.
481